Here is a real time overview of all the steps to prove for yourself that Keyless Encryption works. This overview takes under four minutes.
PROVE THAT KEYLESS ENCRYPTION WORKS
DETAILED LIST OF STEPS
You might want to have this checklist open under a different tab in your browser while you go through the steps to prove for yourself that keyless encryption works. Links below are to segments of the manual. Browse to any link that you wish, then click the browser back button to return to where you are on this page.
1. Get in touch with a confidant and agree on an authentication code. You and your confidant will each follow all the steps from here on.
2. Select a Windows personal computer or a flash drive on which you will install the MarpxPrivacy program. There are advantages to installing on a flash drive. If that is your choice, have a flash drive on hand with at least 8 MB of space available.
3. Create your own Personal ID code. This is for you alone in the world to know.
4. Check that you know where to find the MarpxPrivacy manual in case you get into difficulty. Hint: There is a link to it near the bottom of the page at Marpx.com. For the next section, pages 030 and 050 are particularly relevant.
1. In the first page at Marpx.com, scroll to the list of links at the end of the page. Click on FETCH THE MARPXPRIVACY PROGRAM. You will find yourself in the first page at https://BuyExtremeEncryption.com. Don't let the word "Buy" bother you; the MarpxPrivacy program is free.
2. Read the first paragraph on that page. Click on the link at the end of the first paragraph to learn what to expect.
3. On the What to Expect page, read the first three sections, Our Commitment to You, More Information, and Download Your Free MarpxPrivacy.
4. Select which is your preferred method of installation, a Zip file or an InstallShield Setup. The Setup version is more professional, but it can be used only if your browser allows you to save the downloaded file and run it as administrator. You also need Windows 7 or later for Setup. The Zip download is better if it is not your Windows PC or if you want to install on a flash drive. In either case, you must install to a location where Microsoft's security system will let the program write files.
5. If you click the "Zip" download button, you will not have to install as administrator. Be ready to browse to the location where you want it installed. Then click "Unzip". The installation will take some time, usually less that a minute.
6. If you click the "Setup" download button, watch the download in process signal (often a downward arrow near the upper right of a browser), then watch for opportunity to save the file. Then right click on the saved download and run it as administrator. Make a record for the future where the program is located. If you change from the default location for installation, be sure it is a place where Microsoft will permit files to be written by the program.
1. If you downloaded the Setup version, there should be a shortcut on your desktop. Simply double click on it.
2. Otherwise, browse to where the program is located. In the MarpxPrivacy directory, double click on MarpxPrivacy.exe, the file with a small icon to its left.
3. You will be shown a page in which you are asked to enter your User ID. Enter that in the one or both of two boxes. Click on Keyless Mode. You will be shown the roster page.
1. Click on Add New Entry. You will be shown a page with several data entry boxes.
2. Fill in your confidant's name, and also short name or initials. Ignore the date and Extreme Encryption boxes. Enter the authentication code in each of the two last boxes. Click on Submit New Entry.
3. All going well, you are back at the roster page, and your confidant's name, initials, and date show in the roster box.
The relevant manual page in this section is 430.
1. You need to be certain that your confidant and you have each entered the same authentication code. The best way to do this is to each send a message to the other. Highlight your confidant's name in the list, then click on Encrypt Message. You are shown a page for the purpose.
2. Paste or type text into the large box... more than 50 characters in length. A couple of hundred would do nicely; don't go above three thousand characters. This time around, use only normal characters -- letters, digits, punctuation. If you avoid accented and special characters, each of you will see the other's message more conveniently.
3. Unlike when encrypting files, there is no option to wrap the encrypted version in text. That is done automatically for messages. Notice what is missing. There is no place to enter a key for encrypting! Simply click on Encrypt this Message.
4. You are shown a pop-up. It contains the name of the file that has been created and gives its location. Click OK.
5. You are shown a text-wrapped version of the encrypted message. One way to transmit the message with high security(!) is to copy and paste the message including the <<< and >>> anchors into a social media page. (Put it on a Facebook page frequented by your confidant, and he/she will be able to read it, while Mr. Zuckerberg will not... a most satisfying experience!) Alternately, you could send the file as an attachment to an email or paste it directly into an email.
6. Click the Back to Roster button.
If your confidant sends the message spread with its anchors in the body of an email or on a social media page, the relevant manual page in this section is 440. If it arrives as a file, the relevant manual page is 420.
1. If the text-clad message arrives as a file, open that file with a word processor, highlight (Ctrl-A) its contents, and copy it (Ctrl-C). Otherwise, highlight the message including the anchors however it arrived, and copy it (Ctrl-C).
2. In the roster page, highlight your confidant's name, then click on Decrypt Message. A page will be shown with a large text box.
3. Paste (Ctrl-V) the message including the anchors into the large box. Click on this page's Decrypt Message button.
4. You are shown a pop-up. It contains the name of the plain text file that has been created and gives its location. Click OK.
5. If there were no accents or peculiarities in the message composed by your confidant, you will be shown the message at this point. If not, then you will need to open the file whose name and location was given to you in the preceding step.
1. If there have been any anomalies, review the manual and try again. Delete the confidant entry in the roster, double check with your confidant on the authentication code, and try again.
2. If you each find that the decrypted version of your confidant's message is readable plain text, then you and your confidant have succeeded. You have proved that keyless encryption works.
3. You and your confidant are now set for as many years as you wish of never seeing a key as you exchange files and messages securely.
4. You can add as many other confidants as you wish to your roster. The time required is small -- agree on an authentication code, add a new roster entry, and send a test message.