Safely Sharing Encrypted Audio Files
Guidance on how to share your .cryptovox.json files.
The .cryptovox.json file you download contains your audio message in an encrypted format. Without the correct passkey, the audio data within this file is unreadable and appears as random data.
This means the file itself is generally "safe" to transmit over various channels, as long as the passkey is kept separate and shared securely. However, always be mindful of the metadata:
- Filename: The name you give the file (e.g.,
meeting_notes.cryptovox.json) can reveal context. - File Metadata: The operating system might store creation/modification dates associated with the file itself. The JSON file also contains a timestamp.
Email Attachments
Attaching the .cryptovox.json file to an email is a common method. Be aware of your email provider's security policies and potential file size limits. Remember, the security relies on the passkey being shared separately.
Cloud Storage Services
Services like Google Drive, Dropbox, OneDrive, etc., can be used. Upload the file and share it via a link.
- Consider using password protection for the share link if the service offers it (this would be a *different* password from the Cryptovox passkey).
- Set an expiry date for the link if appropriate.
- Restrict access to specific people if possible.
End-to-End Encrypted Messaging Apps
Many E2EE messaging apps (Signal, WhatsApp, etc.) support file attachments. This can be a good option if you're already using such an app to communicate with the recipient. Even so, share the passkey in a separate message or via a different E2EE channel if possible for maximum security.
USB Drives / Physical Transfer
For very high security requirements, transferring the file via a physical medium like a USB drive can be an option. Ensure the drive itself is handled securely.
Peer-to-Peer (P2P) File Sharing
Services like Wormhole, Tresorit Send, or Firefox Send (when available) can offer more private ways to share files directly with a recipient, often with E2EE and self-destructing links.
- File Size: Audio files can be large. Choose a sharing method that comfortably supports the file size.
- Recipient Trust: Ensure the recipient will handle the file responsibly and securely delete it if necessary after use.
- File Integrity: Most modern transfer methods include checks to prevent file corruption. If you suspect corruption, try re-transferring.
- The Almighty Passkey: Reiterate to your recipient that the file is useless without the correct passkey, which must be obtained separately and securely.
- File Naming Conventions: If the content is highly sensitive, consider using generic or coded filenames (e.g.,
data_package_001.cryptovox.json) to avoid revealing context through the filename. - Verify Recipient: Before sending sensitive files, ensure you are sending them to the correct person/email address/contact.
The primary security of your shared voice message relies on the secrecy of the passkey. The encrypted file is just a locked box; the passkey is the key.