$1.99
View on iTunes
Category: Utilities
Released: 15 Apr 2011
Published: 18 Sep 2023
Latest version: 2023.37.1
Size: 42.87 MB
Seller: Wyllys Ingersoll
© Wyllys Ingersoll
LANGUAGES:
English
COMPATIBILITY:
12.0 or later
Released: 15 Apr 2011
Published: 18 Sep 2023
Latest version: 2023.37.1
Size: 42.87 MB
Seller: Wyllys Ingersoll
© Wyllys Ingersoll
LANGUAGES:
English
COMPATIBILITY:
12.0 or later
iPGMail
iPGMail is an app that implements the OpenPGP standard (RFC 4880, RFC 6637) and allows the user to create and manage both public and private (RSA, DSA, ECDSA, EDDSA, ECDH) PGP keys and send and receive PGP encrypted messages.
PGP Keys and Messages can be passed to iPGMail several ways:
* From the iOS Mail.app - The iOS mail application will pass PGP attachments to iPGMail directly, eliminating the need to do an awkward copy-and-paste. NOTE: PGP messages that are part of the main body of an email will still have to be copy-and-pasted, only properly tagged attachments can be passed automatically.
* Directly from the system clipboard. Copy-and-paste the PGP message text from any file, webpage, or message, and it can be imported and decrypted by the app.
* iTunes File Sharing - Connect your device to a computer and open up iTunes, in the "Apps" section, you can scroll down and select iPGMail under the File Sharing section and transfer files to and from the app to your computer. Make sure device is unlocked before transferring files!
* AirDrop - Transfer key files from your Mac OS/X system (10.10 or later) to your iPhone/iPad (iOS 7+) using AirDrop feature.
* DropBox - You can link iPGMail to a dropbox account and transfer files to and from your dropbox file space. This means you can encrypt and protect your dropbox files or share files with others through your existing dropbox Public interface.
* Keybase.IO - You can import public keys from http://keybase.io by using the "+" button on the public key listing and then searching for users registered in keybase.io.
iPGMail now allows you to easily reply to encrypted text-based messages and includes the original text with "> " prefixed to the lines. This allows for more email like conversational exchanges, all with strong OpenPGP cryptographic protection.
iPGMail supports PGP key generation (RSA) directly in the app and stores them securely using the iOS keychain for the application. Using your own private PGP keys, you can encrypt and/or digitally sign any messages. Optionally, your public key can be attached to any message you send from the app so that the recipient can then import it into their own keychain, either on the phone or on any computer with PGP support.
iPGMail will import your private keys so you can reuse your existing PGP identity and keys on your iPhone or iPad. Both public and private keys can be imported through the interfaces listed above.
iPGMail allows the user to search public SKS PGP keyservers to find registered public keys for other people with whom the user can then send email that is digitally signed and/or encrypted encoded in OpenPGP ASCII Armor.
This app is ideal for securing your files or for sending secure email messages to specific parties without worrying about it being viewed by anyone other than the designated recipient.
The OpenPGP standard is described here:
http://en.wikipedia.org/wiki/Pretty_Good_Privacy
PGP Keys and Messages can be passed to iPGMail several ways:
* From the iOS Mail.app - The iOS mail application will pass PGP attachments to iPGMail directly, eliminating the need to do an awkward copy-and-paste. NOTE: PGP messages that are part of the main body of an email will still have to be copy-and-pasted, only properly tagged attachments can be passed automatically.
* Directly from the system clipboard. Copy-and-paste the PGP message text from any file, webpage, or message, and it can be imported and decrypted by the app.
* iTunes File Sharing - Connect your device to a computer and open up iTunes, in the "Apps" section, you can scroll down and select iPGMail under the File Sharing section and transfer files to and from the app to your computer. Make sure device is unlocked before transferring files!
* AirDrop - Transfer key files from your Mac OS/X system (10.10 or later) to your iPhone/iPad (iOS 7+) using AirDrop feature.
* DropBox - You can link iPGMail to a dropbox account and transfer files to and from your dropbox file space. This means you can encrypt and protect your dropbox files or share files with others through your existing dropbox Public interface.
* Keybase.IO - You can import public keys from http://keybase.io by using the "+" button on the public key listing and then searching for users registered in keybase.io.
iPGMail now allows you to easily reply to encrypted text-based messages and includes the original text with "> " prefixed to the lines. This allows for more email like conversational exchanges, all with strong OpenPGP cryptographic protection.
iPGMail supports PGP key generation (RSA) directly in the app and stores them securely using the iOS keychain for the application. Using your own private PGP keys, you can encrypt and/or digitally sign any messages. Optionally, your public key can be attached to any message you send from the app so that the recipient can then import it into their own keychain, either on the phone or on any computer with PGP support.
iPGMail will import your private keys so you can reuse your existing PGP identity and keys on your iPhone or iPad. Both public and private keys can be imported through the interfaces listed above.
iPGMail allows the user to search public SKS PGP keyservers to find registered public keys for other people with whom the user can then send email that is digitally signed and/or encrypted encoded in OpenPGP ASCII Armor.
This app is ideal for securing your files or for sending secure email messages to specific parties without worrying about it being viewed by anyone other than the designated recipient.
The OpenPGP standard is described here:
http://en.wikipedia.org/wiki/Pretty_Good_Privacy
What's new in Version 2023.37.1
Bugfixes:
* Use recipients key compression preferences to determine which, if any, compression algs to use when encrypting a message.
* Respect the "Display Version" setting to disable putting the "PGP Version" in the ASCII armor header.
Preparing for OpenPGP RFC Crypto Refresh publication.
* Use recipients key compression preferences to determine which, if any, compression algs to use when encrypting a message.
* Respect the "Display Version" setting to disable putting the "PGP Version" in the ASCII armor header.
Preparing for OpenPGP RFC Crypto Refresh publication.
Download
Version | Uploader | Link |
---|---|---|
2023.37.1 For iOS 16 For iOS 15 For iOS 14 For iOS 13 For iOS 12 | user_hidden-ICPDA | Link 1 |
2023.24.1 | user_hidden-ICPDA | Link 2 |
2023.21.1 | user_hidden-ICPDA | Link 3 |
2022.8.28 | user_hidden-ICPDA | Link 4 |
3.6.38 | user_hidden-ICPDA | Link 5 |
3.6.38 | user_hidden-ICPDA | Link 6 |
3.6.36 | user_hidden-ICPDA | Link 7 |
3.6.36 | user_hidden-ICPDA | Link 8 |
3.6.35 | user_hidden-ICPDA | Link 9 |
3.6.35 | user_hidden-ICPDA | Link 10 |
3.6.34 | user_hidden-ICPDA | Link 11 |
3.6.34 | user_hidden-ICPDA | Link 12 |
3.6.33 | user_hidden-ICPDA | Link 13 |
3.6.33 | user_hidden-ICPDA | Link 14 |
3.6.32 | user_hidden-ICPDA | Link 15 |
3.6.32 | user_hidden-ICPDA | Link 16 |
3.6.31 | user_hidden-ICPDA | Link 17 |
3.6.31 | user_hidden-ICPDA | Link 18 |
3.6.30 | user_hidden-ICPDA | Link 19 |
3.6.30 | user_hidden-ICPDA | Link 20 |
3.6.29 | user_hidden-ICPDA | Link 21 |
3.6.29 | user_hidden-ICPDA | Link 22 |
3.6.28 | user_hidden-ICPDA | Link 23 |
3.6.28 | user_hidden-ICPDA | Link 24 |
3.6.27 | user_hidden-ICPDA | Link 25 |
3.6.27 | user_hidden-ICPDA | Link 26 |
3.6.26 | user_hidden-ICPDA | Link 27 |
3.6.26 | user_hidden-ICPDA | Link 28 |
3.6.25 | user_hidden-ICPDA | Link 29 |
3.6.25 | user_hidden-ICPDA | Link 30 |
3.6.24 | user_hidden-ICPDA | Link 31 |
3.6.24 | user_hidden-ICPDA | Link 32 |
3.6.23 | user_hidden-ICPDA | Link 33 |
3.6.23 | user_hidden-ICPDA | Link 34 |
3.6.22 | user_hidden-ICPDA | Link 35 |
3.6.22 | user_hidden-ICPDA | Link 36 |
3.6.21 | user_hidden-ICPDA | Link 37 |
3.6.21 | user_hidden-ICPDA | Link 38 |
3.6.20 | user_hidden-ICPDA | Link 39 |
3.6.20 | user_hidden-ICPDA | Link 40 |
3.6.19 | user_hidden-ICPDA | Link 41 |
3.6.19 | user_hidden-ICPDA | Link 42 |
3.6.18 | user_hidden-ICPDA | Link 43 |
3.6.18 | user_hidden-ICPDA | Link 44 |
3.6.17 | user_hidden-ICPDA | Link 45 |
3.6.17 | user_hidden-ICPDA | Link 46 |
3.6.16 | user_hidden-ICPDA | Link 47 |
3.6.16 | user_hidden-ICPDA | Link 48 |
3.6.15 | user_hidden-ICPDA | Link 49 |
3.6.15 | user_hidden-ICPDA | Link 50 |
3.6.14 | user_hidden-ICPDA | Link 51 |
3.6.14 | user_hidden-ICPDA | Link 52 |
3.6.13 | user_hidden-ICPDA | Link 53 |
3.6.13 | user_hidden-ICPDA | Link 54 |
2.5.0 | not_given/ICBot | Link 55 |
2.0.9 | Sonics | Link 56 |
2.0.8 | Sonics | Link 57 |
2.0.8 | not_given/ICBot | Link 58 |
2.0.6 | not_given/ICBot | Link 59 |