- Mail Settings
- Image authentication
- Folder Synchronization
- Delete Account
- Sending without encryption
- Code encryption
- Public key encryption
- Folders, subfolders
- Additional functions
- PC and Mac
- Launching the program and its functions
- Program settings
- Mail function
- Settings in Mail function: Account, Mail Settings, Signatures
- File Storage
- Phone and tablet
- Handling the private key
- Using Contacts
- Free basic package
- Paid subscritpions
- Read only accounts
- SMS subscritpions
- Referral program
- Payment methods
- EU payment rules
- Registering a domain
- Adding a domain to your account
- Using your domain with client side encryption
- Sharing your domain with others
We try to keep our registration form as simple as possible. We ask for only the most basic information, and we check only to confirm that you have used a valid e-mail address.
We offer two account types: single user accounts and multi-user accounts. A single user account is a simple user account with only one user login. A multi-user account is an administrator account. It gives the account administrator the power to add additional user accounts that are connected to this main account. An administrative user can log into a connected user account, can open its email and file storage, and can access its password manager without the password corresponding to the user account. An administrator user can also send email on behalf of the connected user account. However, this is always clearly shown in the sent mail. Please note that you cannot change the account type after registration.
The system will automatically log you in after registration and ask you if you would like to switch to image authentication. It is advised to do so.
The next step is to review your basic and most important settings. You will also be able to change these settings later in mail settings. Next you will be logged in to your mailbox. You will find a welcome mail in your inbox with a few useful instructions. The upper menu shows the main functions of our service: storage, mail, safe, contacts, account and subscription. You can find your mail folder list on the left. Under it there is a referral form, which can be used to invite friends in exchange for free space. There is also an information bar on the bottom. It shows how much space you are using, as well as the total space you have (mail and storage combined).
To log into your account, you can use your user name alone, or you can use your full Confidesk email address (email@example.com). Even if you have your own domain and your primary address is one of your domain aliases, you always need to use the user name you chose at registration.
Most of the options in your account menu are only available on your web-based account. Your associated client side encryption accounts will inherit the web-based configuration.
Please note that if a setting is not available on our mobile or PC application that means that your connected accounts have the same configuration as your web account. For example your subscriptions or domains are shared between your associated accounts. All settings are automatically applied in mobile and PC/Mac apps.
The details tab shows the details of your account: your name, sender name, address, notification mail and mobile number. Your name and address is used for billing, your notification email is used to send you important information, and your mobile number is used if you use mobile authentication. When you change your mobile or notification mail you need to provide your password. If the sender name is filled, this name appears in the mail you send instead of your first and last name, which are always used on your invoices.
This tab contains the most important mailbox settings.Main Settings
- Encrypt subject: the subject of your emails are not stored encrypted by default to access your mail faster. If this is ticked, the subject is decrypted on the fly when you open your mail folders, which makes the process a little slower.
- Mobile notification: if you have SMS subscritpion, you can choose to receive an SMS notification each time you receive an email.
- Allow other Confidesk users find you by your notification email: When a Confidesk user tries to send a message to the email address you use as notification address we will let him or her know that you have a Confidesk mail address, so the mail can be sent securely there.
- Enable autoreply: An out of office automatic reply can be set up with this option.
- Session timeout: The system will automatic logs you off automatically if there is no activity in your account after a pre-determined amount of time.
- Email notification: If this is on, every time you get a mail, you get a notification to your notification mail address.
- Allow images in emails: If ticked, we show all images as embedded. We strongly recommend not switching this on.
- Automatically save new recipients in contacts: If on, recipients not already listed in your contact list are saved there automatically.
- Items on page: This regulates how many items appear on one page when you list your mail folders. The less you choose, the faster the service. Mobile always shows 50 and it can't be changed.
- Offer to save recipients to contacts, if they are not in the contact list: If this is on, we ask you if you want to save a contact if it is not already on your contact list.
- SMS authentication: If you have an SMS subscritpion, you can choose to receive a one-time password on your mobile device at every login. This one-time password will be required to log in to your account.
- Language for messages/notifications: The default system language.
Your web account has a key pair (as a client side encryption account does). However, the web account's keys are created and stored on our servers. Because our system is compatible with any public key encryption service, you can download the public key of your account and you can give it to others who use public key cryptography, allowing anyone to send you encrypted mails. If the other parties use our service, it is useless to give them your public key, since they have access to it automatically.Domain and Mail Alias Settings
You can use your own domain in our system, and you can even share a domain with others. This means that one domain can be used with an unlimited number of accounts. Please read our how-to pages regarding these settings:
How to use your domain on Confidesk
How to share a domain on Confidesk
You can create multiple signatures to be used with your emails. You can configure one to be used as a default. The default signature is automatically selected and attached when you write a new email or reply to an email. However you may decide not to attach the default signature or to attach another signature during the mail editing process.
Filters are used to automatically move incoming messages to different folders in your mailbox. You can create the different criteria required to send different email types to different folders. The function works as any other filtering system does. Just choose an option in the available selection lists and you will be offered the possible configurations or asked to provide the filtering conditions.
Image authentication functions as an extra layer of security. If image authentication is switched on you will need to correctly identify a pre-selected image in order to gain access to your account at each log-in. You can upload your own images, or you can use the images we have provided. In order to configure this setting please follow the instructions provided on the configuration page.
Please keep in mind that the image order is randomized at every login. Therefore you must be able to identify the exact image, not the place it was when you selected it during configuration.
If you use our PC/Mac client to have your files on your machine on an encrypted local files, you can configure here which files should be copid to your computer. Only the selected folders and their content are copied to your local hard drive. Additional folders are kept on our servers only.
This option is not available for client side encryption enabled accounts.
You can delete your account but only if you can provide your passphrase. Please note that when you remove your account, we delete everything, with the exception of our system log. This process can't be reversed.
You can set up your connected accounts for client side encryption. You can read about this process in detail in the dedicated section.
Our mail servers do what other mail servers do: send and receive emails. However, there is one big difference. We use our own internal mail database system, which is not compatible with other mail server databases. Most mails go through our spam filter first. Encrypted mails can't be checked, because their content is available only to those who have the key to open them. These mails are the ones sent between Confidesk users, or sent encrypted in or out of our system.
Click on the “create mail” button to create a new email. You need to list the recipients one by one. This is needed because you can decide by recipient about the way the mail should be sent (encrypted or unencrypted). If you have saved contacts the possible recipients are listed as you type. This allows you to quickly and easily choose the intended recipients.
There are two ways to attach files to your emails: you can attach files from your computer using the "browse" button or you can attach them from your Confidesk file storage by clicking on the "attach from storage". The second option offers you the files stored in your file storage on our servers. These files are available for you everywhere.
You can choose to send your mail without encryption. We will send the mail as if we were an everyday mail service provider.
If you have sensitive data to send it is better to opt for encryption. Please note that messages sent this way are deleted automatically after 7 days. We offer you 2 kinds of encryption options by default::
- Pass phrase: To use this option you need a password known by both you and the recipient. Please note that this is not your Confidesk password; this is a pre-agreed code. When you choose this option and provide a password the email is encrypted with a temporary key. It can be opened only with the given password. The recipient will receive a link to the message, and if he/she knows the password he/she will be able to open the mail.
- SMS: If sending messages to North America (international calling code is +1), this service is free. If you will be sending SMS messages outside of North America, you will need to purchase an SMS subscription. SMS encryption works similarly to pass phrase encryption. The difference is that you not only need to provide the email address of the recipient, but also his or her mobile number. When you send the email we send a link to the recipient’s email address, providing him or her with access the email. We will also send the password required to open the message to the mobile number of the recipient. To open the message, the recipient has to click on the link and use the code provided in the SMS message.
You can also connect public keys to your contacts if they use public key encryption. You can encrypt messages with these public keys. You only need to get their public keys, go to their contact details, and upload the key. You can upload 3 keys per a contact. If the recipient is in your contact list and we find an associated public key, this option is offered automatically. It is most like the encryption processes preferred by the recipient.
You have a few default folders: inbox, unread, important, drafts, sent and junk. Unread and important are virtual folders; the emails listed here are actually stored in their original folders. You can create other folders using the “my folders menu,” and you can also create subfolders under folder inbox, sent and under folders created in My Folders. The only restriction is that you can have only unique folder names. Two folders cannot have the same name.
You can always change a mail's properties between important and not important; Read and Unread.Important and unread mails are also listed in the Unread and Important folders, while they can also be found in their original folders.
We have a spam filter which checks incoming and outgoing email. If an incoming mail is deemed to be spam it will be moved to your junk folder. If we determine that an outgoing mail is spam we will send it back to you in order to prevents our users from sending spam. Please note that we can't check encrypted messages. If a message is sent between Confidesk users, or the mail is sent out encrypted or sent in with public key encryption, the message is not checked by the spam filter.
Along with our mail service we offer cloud file storage. This service is similar to other cloud storages with a few differences. We encrypt all of the files stored on our servers. We can't access these files. Only the owner (who has access to the password) is able to do so. Our main function is storing files on the servers, like you store your valuables in a safe. Synchronization is a secondary function. The uploaded files are available on supported platforms by dedicated applications and on the web via browser. However, the latter is only available in case of server side encryption. The storage is accessible from the mail function, so it is possible to directly attach files from storage to emails.
In order to ensure that you have access to your files anywhere at anytime we store all of your encrypted files on our servers. Files are available to you wherever there is an Internet connection. These files are available for you even in the case of client side encryption, if you have your private key on your device which you use to log in. If you access the files with the client side account, the data is downloaded to your device first, and decrypted there.
If you use our client programs for Windows, OS X and Linux, you will be allowed offline access to your files. This enables you to access and work on your files as if they were on your computer. The program creates a local encrypted drive and stores a copy of your files there. You can choose which folder should be copied to the local drive.
Our Android and IOS app can access your files on the servers. While you can access your files from these mobile devices please note that mobile apps don't have offline storage.
You can upload files to the storage via browser or mobile apps. However, it is more convenient to use our Windows, OS X or Linux client, which automatically copies the files from your local storage to our servers in the background. Just copy the files on to the drive. Everything else is automatic. You can open the files, edit them, and save them.
The PC program automatically synchronizes the changes and new files with our servers. This facilitates encrypted cloud storage, which is available on the go.
File sharing is only available for users who use server side encryption. To share a file, just choose the local menu in the mobile app or in the browser, type in the Confidesk user's user name, and click on “share.” The file will be available in the user's "shared items" folder within a few minutes. If the user is in your contacts he or she is automatically offered as you type the name. Shared files can't be edited by the user with whom you share them, as the access is read only.
Our password manager stores your password in your encrypted online cloud storage. This means that every change goes directly to the cloud and is instantly accessible on all of your devices. You can create an unlimited number of databases (for example for your work, for your private data, or for sharing account information with others).
It contains a password generator to help you create strong passwords.
The mobile apps automatically copy the password into the device's clipboard when you touch the field in reading mode.
Password databases are stored in a special folder in the file storage. The folder name is PasswordSafe. If you open this folder you will find all of your databases. These are XML files; you can't directly open them from here. If you try to do so, your app or browser will either offer to download the file, or open it and show you the content in txt format.
A database can easily be moved between accounts. You only need to copy the file to the PasswordSafe folder of another account. It will instantly be available in the Safe function. You need to be careful; the database file should not be sent in email or shared via unencrypted cloud storages. Since it is compatible only with our safe function, it should only be shared or sent between Confidesk accounts.
If you'd like to make a backup of your databases, just copy the database file to an other folder in your file storage.
Our password manager uses pre-defined categories; you can't add any additional categories. These categories are access codes, bank accounts, credit cards, devices, email accounts, identity cards, web logins, vehicles, and general. The latter is for entries that do not fit into the other categories. Each category has its own unique field set, and each has a note field for storing additional information.
The password manager works as any similar product; there is only one mandatory field, the title of an entry. All other fields can be left empty.
Our contacts manager is closely connected to our mail function.
Each entry can have 3 mail addresses, 3 phone numbers and an address card. A minimum of one name and one email address is mandatory. If you opt for automatic saving of contact information, the email address is used as a contact name.
You can use groups to organize your contacts. These groups are used to list only the contacts they contain. You can also use the groups to easily send messages to multiple people. To do so, open the contacts function, select a contact group, and click on “compose message” button. This opens a mail editor form where the recipient fields are automatically filled with the contacts in the group. You can also select multiple contacts from a contact list and send them group messages. If a contact has multiple mail addresses, the primary one is used. 20 is the maximum number of recipients allowed in a group email in order to prevent spamming.
Each contact can have three associated public keys. This is important if your contact uses public key encryption. To add a public key to a contact, open its details page and click on “public keys.” If you use browser, you can upload the key file to connect it to the contact. If you use one of our app, then you need to copy the content of the public key file into the appearing field. When you send an email to a contact that has a public key, this form of encryption is automatically offered. If the contact has multiple public keys, the ID of the key is shown to easily pick up the one you want to use.
When you create an email in your browser our service automatically checks your contacts as you type the recipient name or mail address into the to, cc or bcc fields, and lists the possible recipients so that you can easily pick the one you need. You can also write a mail to a contact if you open the details page and click on the email address link, which opens a mail editor form. If you use mobile you need to open the contacts from the mail editor to easily add the contact as recipient.
If you access our service on mobile, the only convenient way to do so is to use our mobile apps. Also, if you use client side encryption, you must use one of our client apps to access your account, because in this case, the encryption/decryption happens on the local device by our programs. To access and conveniently use your file storage the best option is our PC/Mac program.
Supported operating systems are Windows from Windows 7, OS X and Debian based Linux distributions (e.g. Ubuntu), however it can easily be installed on rpm based Linux systems using "alien". The packages are available on our download page; there is no other authentic source. To install the app, download the executable from our site, launch it and follow the instructions.Launching the Program and Its Functions
The program should create a launch icon in the application menu of your operating system. It will always start automatically when you log in to your OS, unless you change this in settings. After you log in, the application icon is placed on the taskbar or notification area of your OS. All of the functions can be launched here by (right) clicking on the icon. Available functions are: storage, mailbox, safe, log in, log out, settings, and, in case of client side encryption, key sharing.Program Settings
To open the program settings, (right) click on the app icon on the taskbar and choose “settings.” You can configure if the program should start when you log into your OS. You can also change where the mount point of your drive should be, and you can set up where the local storage for your encrypted files should be on the file system. If you don't have good reason to change the mount and storage paths, it is recommended not to do so.Mail Function
The mail function is basically the same as the mail function on the web interface. All of the functions that are available on the web are also available here. The biggest difference is that the program keeps a local copy of your mails, and searching is easier and better than on the web. The program also regularly checks your emails on the server and shows you a notification if new mail arrives. The session timeout is not applicable in the case of the program; it remains online until you log off.Settings in Mail function: Account, Mail Settings and Signatures
Most of the settings that you can change on the web are not available in the program. What is available can be accessed in the settings menu of the mail function.
- Account: You can check your primary email address here, as well as download your public key. Your referral program link can also be found in this menu.
- Mail Settings: This menu contains some of the settings that can be changed in Mail settings on the web.
- Signatures:This is the same function as the signature function on web.
The file storage menu opens the local drive of your Confidesk account. It is a local encrypted drive that can be used as a normal drive while you are logged into the application. You can copy, move, rename, and edit files as in any other folder. Changes are synchronized to your encrypted cloud storage. If you are not logged in to the application, this drive is not available and the local content is stored encrypted.Safe
The safe function is the same as the web version.
Our mobile apps are available on IOS (iPhone, iPad, iPod) and Android. The apps are currently for online access only. You need an Internet connection in order to access your data. In the case of client side encryption, the apps download the encrypted data to your device first, and then decrypt it and show you the content.Functions in Mobile Apps
The mobile apps are almost identical to our PC apps. The difference is that their user interface is based on the tools offered by their operating systems. For example the function menu to access mail, storage, safe and settings on Android is available by touching the menu sign on the top-left corner.Settings in Client Applications
The mobile applications don't have a dedicated mail settings menu. They have a universal settings menu, which displays all of the available options that can be changed in mobile. These are the same as on PC/Mac.
If you use client side encryption, you can access your account only if you have your private key on the device that you are using. Transferring the key through the open Internet is very risky. You should not use popular unencrypted cloud file services or email services like Box, Dropbox, Google Drive, Gmail, Yahoo mail, Outlook etc. The most secure option is device-to-device transfer (for example, using a memory card to store your keys and attach it to the device you use).
As we recognize that this won’t work in many cases (for example if you can't attach a memory card to your device) we have created a simple tool that helps you to copy your private key onto another device. Please read our key transfer how-to for more information.
Contacts works a little bit differently on mobile and PC/Mac than on web.
- Contacts don't appear as you type on mobile. You need to tap the "add recipient" button to use your contacts. If using PC/Mac, the function is available.
- You need to copy-paste the public keys to associate them to a contact. You can't browse the key file as you would on the web.
- You can't send group messages directly from contacts on mobile. This function is available only on PC/Mac and on the web.
Client side encryption means that:
- Only encrypted data leaves your device.
- The key needed to access your data is stored locally.
- The password to unlock your encryption key never leaves your computer, tablet, or mobile device.
- Our service downloads the accessed data from the server in encrypted format.
- It then decrypts the data locally.
- If you add a new file or email or change existing files or emails the service encrypts them locally.
- It then copies the new or revised data to your cloud storage on our servers in an encrypted format. This ensures that you can access your data from anywhere.
- To access your storage from other devices you only need to copy your keys to these devices. This ensures that once you log into your account, you can access your data from anywhere.
Accounts used for client side encryption can't be created without a web account in our system. You don't need to use your web account for storing files or sending mail if you do not want to do so, but a web account is required because it stores the following information:
- Subscription information
- Domain and alias settings
- Mail settings
- 1) Create an alias for your client side account. This means actually creating a new user account in our system.
- 2a) Associate the new account with your own key pair by uploading the public key to our key server.
- 2b) Or, if you don't have your own key pair, log in to your web account using our Android app or PC/Mac client and let the applications generate one for you.
Please read our detailed how-to regarding logging in with key.
Please read our detailed how-to regarding key transfer between devices.
In the case of client side encryption accounts, some of the settings are shared with the web account in which you created the alias. This includes your billing details, notification address, mobile number and domain settings. This means that subscription and domain settings can be done only on the web.
Contacts are also shared between your client side encryption accounts and web based (server side encryption) account.
Your subscription type only determines the size of your storage space. All functions are available for all of our users regardless of their subscription package.
The drive size that is created by our PC/Mac program on your computer is always the size of your subscription package. This means that the operating system will deny any attempt to copy more data than available space can hold.
The basic package is free. However it only offers a small amount of storage space. This amount is enough to test our service or to use for basic email.
If you run out of space, you can subscribe to one of our paid packages, which provide additional space. You can check out available options on our package list page.
If you use all of the space you have, your account automatically becomes a read only account. A read only account can still receive mail, but it cannot send mail and cannot upload files to storage. Please note that no data is lost when an account transitions to read only. All of your mail and files are still kept in your storage.
You can buy SMS credits, which can be used in several different ways:
- Mobile authentication: You can set up mobile authentication. This means that you will receive a login code via SMS to your mobile device at every log in. The system will ask for this code before it allows you to log into your account.
- SMS notification: You can choose to receive an SMS notification each time you receive an email.
- Mobil encryption: Instead of using the pre-agreed passphrase, you can use mobile codes to encrypt/decrypt messages sent to your recipients if you know their mobile number. When creating an email, choose SMS encryption and provide the recipient's mobile number. When you send the mail, a link is sent to the recipient. This link opens your message, and the password to open the message is sent via SMS. These messages are deleted after 7 days.
If you send the message to North American number (international calling code is +1), mobile encryption is free.
You can expand your account’s storage capacity by referring our services to others.
You can find a referral link in your account's settings on the "account/details" page on the web, as well as in the "account" menu in the PC/Mac program's mail function.
On mobile, you will find an “invite friends" function, which opens a mail editor form with a pre-defined mail text and your referral link. This function is also available on the mail page of our web application, situated in the bottom left corner.
If you send this referral link to others and they register an account using the referral link, you will earn free space.
Please note that the maximum space that can be earned this way is limited and usually smaller than the smallest paid package.
Coupons are used to offer customer discounts or to provide complimentary packages. Some coupons must be used exclusively at registration, because they are for new users only. If you forget to use your coupon, contact our support, they can apply the discount or add the packages to your account if you know the code and the offer is still valid.
We accept Paypal, Mastercard and Visa. We do not accept Bitcoin.
If you are a resident of the European Union and you pay for our service as a private person, we may need to add VAT to your subscription fee.
You can use custom domain in our system for your email. This means that you can change your primary mail address from firstname.lastname@example.org to email@example.com.
You can use up to six email addresses in one account. Of these six email addresses you can establish one as a primary address. This primary address is automatically used when sending a mail, though this can always be changed in the mail editing form. If you have multiple addresses they are listed in a selection list in the "from" line while creating an email, and the sender mail address can be changed here.
Even if you have your own domain, you need to use your Confidesk user name when you log in to your account.
We don't register domain names and we cannot tell you which service provider is the best to use. You must already have your own domain name in order to use it in our system.
Please read our How-to page.
Please read our How-to page.