Here you can find our guides for macOS operating system. Just pick your application and follow guides as they are ordered in the list.
Guides are labeled with three icons:
If you are still unsure, here is a general structure of a workflow:
Time: 10 min
GPG Suite (also called GPG Tools) is an open source software package for safe communication. This software bundle is essential since it takes care of encryption and signing your emails. It also enables you to manage your keyring - import and export keys, edit them and so on. Here you will learn how to install it.
Time: 10 min
Enigmail provides support for GPG for Thunderbird so you can use it in the email client. Without it, you would not be able to use everything Gpg4win offers. Remember, you also need to instal GPG Suite (also known as GPG Tools).
Time: 10 min
This guide will tell you how to set Enigmail up to ensure it works flawlessly with Cryptoucan. Follow this tutorial to set up Enigmail in such a way it behaves the way you want it to - showing correct menu options, unlocking sign and encrypt functions or choosing correct keys manually.
Time: 5 min
All our devices come with the same PIN codes - this is something you want to change as soon as you receive your own device. There are two PINs supported by Cryptoucan, you'll also learn here the difference between User PIN1 and Administrative PIN3.
Time: 10 min
Before sending encrypted or signed emails with your name on it, you need to generate new set of cryptographic keys - and optionally get a revocation certificate. You cannot use your previous ones as generating the new keys right to your Cryptoucan ensures they will be safe. This tutorial will guide you through the process of generating new keys and configuring their properties.
Time: 5 min
There are few attributes in Cryptoucan that you can use to identify the device. In case you'd lose your device it can be identified through this information. Learn how to change the owner's name and other information stored inside your Cryptoucan.
Time: 5 min
Sending encrypted emails using the other person's public key ensures that only they can read the message - using their private key. Learn how to encrypt the emails you send and also how to decrypt and read emails that someone encrypted for you using your private key.
Time: 5 min
Signing emails using your private signature key will ensure the receiver knows for sure it was you who sent him the messsage. In this day and age of mass impersonation, this is the best way of securing the authenticity of the conversation. Here you will learn how to sign emails and read other people's signatures.
Time: 3 min
You don't always need to encrypt a whole email - just the file itself. You can encrypt whatever file right from the context menu - for your use and other users, too.
Time: 2 min
You may recieve en encrypted file or you may have encrypted one for your own use in the future that you now need to decrypt. In this guide you will learn how to decrypt any type of encrypted file.
Time: 5 min
You don't always need to sign a whole email. Sometimes you need to sign a file itself. Learn how to sign files right from their context/explorer menu.