Skip to main content

Introduction

The mailbox mechanism in tiCrypt allows external file importing into a user directory. The import mechanism uses the user’s public key and ensures that only the user that sets up the mailbox can access and decrypt the files.

If a hacker impersonates a contributor and attempts to send in a malicious file through inboxes, the system will lock automatically. Due to strong encryption, there is no access to the data, even in the case of a malicious file being in the system.

The contributors will never have access to the files unless the user, who agrees to take full responsibility, specifically downloads and shares the files with the contributors. Usually, users with such permissions are the admins and the project leaders.

info

The main purpose of tiCrypt mailboxes is to receive files from outside contributors. Not sending files outside the system.

Mailboxes appear like a normal directory, and files placed inside them can be shared, downloaded, and viewed.

For the mechanism to work, a website that delivers the mailbox single page application and the mailbox settings in either the system file or global system settings have to be set up to point to the mailbox website.

The mailbox application can be hosted anywhere, entirely independently of the location of the tiCrypt server.

From a management perspective, each mailbox may have one or more access points. Each access point may have an expiration date and a custom capacity.

There are two types of access points in mailboxes:

1.URL: May be accessed through the web browser of the outside contributor's computer.

2.Command: May be accessed via the command prompt of the outside contributor's computer.