November 2020
Copyright©ChineseHumanRightsDefenders20201
Digital Security Tips
for Hong Kongers
November 2020
Copyright©ChineseHumanRightsDefenders20202
There is no perfect way to
protect yourself online.
No tool can completely protect you. However, you can adopt some tools and
behaviors to try and mitigate some risks.
November 2020
Copyright©ChineseHumanRightsDefenders20203
Some
Questions
to Ask
Yourself
• What do I want to protect?
• Who do I want to protect it from?
• How bad are the consequences if I fail?
• How likely is it that I will need to protect it?
• How much trouble am I willing to go through to
try to prevent potential consequences?
More on how to develop a personal security plan from
Electronic Frontier Foundation (English):
https://ssd.eff.org/en/module/your-security-plan
November 2020
Copyright©ChineseHumanRightsDefenders20204
Risks in Hong Kong
Hong Kong has high physical security risks, which make digital security
risks greater as police can obtain devices and/or physically force access.
Police can stop and
search anyone on the
street for no cause to
check ID
Police can search
properties without a
warrant under the new
National Security Law’s
implementing rules
Authorities can prevent a
person suspected of
“endangering national
security” from leaving
Hong Kong
November 2020
Copyright©ChineseHumanRightsDefenders20205
Surveillance Risks
Your phone is a tracking device.
It always sends location info to the phone
company.
Police can likely access that data.
GPS/location services can store data on
where you have travelled on your phone
including metadata on photos.
If you are detained, police could access
it and know your movements.
November 2020
Copyright©ChineseHumanRightsDefenders20206
Tips to
Protect
Yourself
Try to limit your use of your phone.
- Viewitonlyasacommunicationdevice.
- Don’tsavealotofmessagesandemailson it.
- Don’tdownloadorstoresensitive filesonit.
Use strong end-to-end encrypted apps with
disappearing messages.
For extra sensitive trips, consider leaving your
phone at home or covering it with a faraday
bag/two layers of aluminum foil.
November 2020
Copyright©ChineseHumanRightsDefenders20207
8 Tools for your
Digital Security
Passcode
Password Manager
Virtual Private Network (VPN)
Encrypted Messaging Apps
Secure Email – Protonmail
Encryption – Files and Cloud Storage
Delete Files
Advanced – GPG Encryption
November 2020
Copyright©ChineseHumanRightsDefenders20208
Passcode
iPhone
01 Do not use face
recognition and Touch ID
as they can be easily
used to open your device
Change your passcode
to over six-digit (ideally
10 digits).
If have iPhone 5S or later,
full disk encryption is
automatically turned on
once you have added a
passcode.
November 2020
Copyright©ChineseHumanRightsDefenders20209
Passcode
iPhone
01
Make sure USB
Accessories is toggled
off to prevent access
to your device through
a USB cable
Can set up phone to
erase all data after
10 failed passcode
attempts
November 2020
Copyright©ChineseHumanRightsDefenders202010
Passcode
Android
01 Android phones have
different system
settings, but most
have passcode option
under lock screen.
Don’t use any smart
lock options
November 2020
Copyright©ChineseHumanRightsDefenders202011
Passcode
Android
01
Make sure to use a
pin or password as
those are the most
secure
Be sure to turn off
biometric unlock
options.
November 2020
Copyright©ChineseHumanRightsDefenders202012
Password
Manager
02 • A strong password for each account is one of
the best tools you can use to protect yourself
online
• Most people cannot remember multiple
passwords and use the same password for
several accounts. This is extremely insecure!
• Password managers help you to have a strong,
secure password for all your accounts
• Only need to remember one password
Recommended application: KeePassX
https://www.keepassx.org/
More on passwords:
https://ssd.eff.org/en/module/creating-strong-passwords
November 2020
Copyright©ChineseHumanRightsDefenders202013
Virtual Private
Network (VPN)
03
• Install and use VPN on phone and
computer
• Especially important to use VPN
whenever connecting to free public
WiFi
• Your device could be accessed
through a free public WiFi
connection. Any WiFi without a
password is insecure and puts your
phone at risk of being hacked
• Some resources to help select a VPN:
https://freedom.press/training/choosing-a-vpn/
https://thatoneprivacysite.net/
• More advanced users can consider
using Tor Browser (computer and
Android only)
November 2020
Copyright©ChineseHumanRightsDefenders202014
Encrypted Messaging Apps04
Wire
wire.com
Signal
signal.org
WhatsApp
whatsapp.com
Telegram
telegram.org
End-to-end encrypted (E2EE) ✔ ✔ ✔ Not by default
Disappearing messages ✔ ✔ ✖ ✔
Can register with email ✔ ✖
*Can use VoIP number
✖
*Can use VoIP number
✖
*Can use VoIP number
Passcode for app ✔ ✔ ✖ ✔
Can remove group members ✔ ✔
*New group only
✔ ✔
Channels to distribute content
widely
✔
Notes: Recommended Recommended Owned by Facebook Incidents in mainland
question strength of
encryption (e.g. Jiang
Tianyong case)
November 2020
Copyright©ChineseHumanRightsDefenders202015
Secure Email05
Consider using ProtonMail mail for more sensitive communications and
can keep other emails for less sensitive mail
Advantages of using a free secure email like ProtonMail:
• End-to-end encryption to other ProtonMail accounts
• Disappearing emails (timers set by sender), which
allows sensitive information to automatically be delete
from the inbox/sent folder
• Servers which are not run by corporate interests
• Two-factor authentication
• Easy to use interface that allows for searches and
available on mobile app (which allows to set up a Pin to
open the app
https://protonmail.com/
November 2020
Copyright©ChineseHumanRightsDefenders202016
Encryption
Local Files
06 Create an encrypted folder on your
computer.
• Folder can be stored on your computer, external
harddrive, or USB.
1. Download and install Veracrypt:
https://www.veracrypt.fr/en/Downloads.html
2. Create new volume
• Follow tutorial for step-by-step instructions:
https://www.veracrypt.fr/en/Beginner%27s
Tutorial.html
• Note for Mac users: need to have FUSE installed
3. To store files: Open Veracrypt, mount volume
(folder), place files inside, and dismount folder.
Reminder:
If you are detained and your device is seized by police,
they can potentially physically force you to decrypt files
November 2020
Copyright©ChineseHumanRightsDefenders202017
Encryption
Cloud
Storage
06
Cryptpad https://cryptpad.fr/ is a free, open
source and end-to-end encrypted cloud drive
Folder can be stored on your computer, external harddrive,
or USB.
• Can register anonymous accounts
• Limited storage (50MB for free account)
• Document/files can be set to disappear
November 2020
Copyright©ChineseHumanRightsDefenders202018
Delete Files07 Normally when you move a file to trash, your
computer saves a version of it which someone
could restore.
To permanently remove the file, you need an
application which will write over the file.
• Further reading:
https://securityinabox.org/en/guide/destroy-sensitive-
information/
• On Windows: https://ssd.eff.org/en/module/how-
delete-your-data-securely-windows
• Note for Mac: This cannot be done with newer Mac
computers because they use an SSD drive, which
cannot be written over. Best bet is to encrypt your files
• Explanation: https://ssd.eff.org/en/module/how-
delete-your-data-securely-macos#SSDs
November 2020
Copyright©ChineseHumanRightsDefenders202019
Advanced:
GPG (set up a key)
08
1. Download and install GPG Suite (which includes the GPG
Keychain): https://gpgtools.org/
2. To set up a key:
Open up “GPG Keychain” à go to “File” à “New Key” add relevant
info including email address and strong password and click
“Generate Key”
3. Exchange public keys with trusted partner:
Right click and select “export” to generate key file.
Do not include secret key in exported file.
Send your public .asc keyfile to other people to encrypt files and
emails with them
4. When you receive a key, double click the .asc file to import into
your GPG keychain
5. Exchange fingerprints to verify key. Afterwards, double click on
imported key after confirming fingerprint and set ownertrust to
“full”.
Make sure to NOT upload your key to
the keyserver when given this
prompt.
November 2020
Copyright©ChineseHumanRightsDefenders20202
0
Advanced:
GPG (encrypted emails and files )
08
After installing GPG Keychain and creating a key...
1. Right click file you wish to encrypt, go to services
and select “encrypt file”.
2. Select key and click encrypt.
3. Your file is encrypted. It needs the secret key and
password to be decrypted.
4. Can encrypt it with your own key but someone
with access to your computer can decrypt this file.

More Related Content

PDF
Enhance Security with Windows 10 and Office 365 - Infographic
PDF
Cybersecurity Awareness Training Presentation v1.1
PDF
7 Cybersecurity Sins When Working From Home
PDF
Cybersecurity Awareness Training Presentation v1.2
PPT
Information security awareness
 
DOCX
Hamza
PDF
Securing the Cloud for a Connected Society
PPTX
Data protection on premises, and in public and private clouds
Enhance Security with Windows 10 and Office 365 - Infographic
Cybersecurity Awareness Training Presentation v1.1
7 Cybersecurity Sins When Working From Home
Cybersecurity Awareness Training Presentation v1.2
Information security awareness
 
Hamza
Securing the Cloud for a Connected Society
Data protection on premises, and in public and private clouds

What's hot (17)

PPTX
Private Data and Prying Eyes
PPTX
The Mirai Botnet and Massive DDoS Attacks of October 2016
PPTX
Cyber security for journalists
PPTX
Newsbytes_NULLHYD_Dec
PPT
Bulletproof IT Security
PDF
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
PDF
Mobile Security: The 5 Questions Modern Organizations Are Asking
PDF
Defending Against the Dark Arts of LOLBINS
PDF
Cscu module 03 protecting systems using antiviruses
PPTX
Hyphenet Security Awareness Training
PDF
How To Protect Your Website From Bot Attacks
PDF
Free or low cost data cyber and data protection technologies for home remot...
PDF
Cscu module 04 data encryption
PDF
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
PPTX
How To Use It With Safe
PDF
How To Defeat Advanced Malware. New Tools for Protection and Forensics
PDF
Implementing security on android application
Private Data and Prying Eyes
The Mirai Botnet and Massive DDoS Attacks of October 2016
Cyber security for journalists
Newsbytes_NULLHYD_Dec
Bulletproof IT Security
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
Mobile Security: The 5 Questions Modern Organizations Are Asking
Defending Against the Dark Arts of LOLBINS
Cscu module 03 protecting systems using antiviruses
Hyphenet Security Awareness Training
How To Protect Your Website From Bot Attacks
Free or low cost data cyber and data protection technologies for home remot...
Cscu module 04 data encryption
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
How To Use It With Safe
How To Defeat Advanced Malware. New Tools for Protection and Forensics
Implementing security on android application
Ad

Similar to Digital Security Tips for Hong Kongers (20)

PPTX
Going Passwordless with Microsoft
PPTX
Android vs iOS encryption systems
PDF
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
PDF
How to Secure Your iOs Device and Keep Client Data Safe
PPTX
Cyber Security Seminar
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
PDF
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
PDF
INSECURE Magazine - 35
PPT
Basic Digital Security
PPT
Jitter Bugslec
PPTX
Social Engineering and Identity Theft
PDF
Entreprises : découvrez les briques essentielles d’une solution IoT
PPTX
Iron Bastion: How to Manage Your Clients' Data Responsibly
PPTX
Public - Cybersecurity awareness presentation (1).pptx
PPTX
Forensic And Cloud Computing
PDF
The Safest Way To Interact Online
PDF
Password Overload_ Smart Ways to Manage Your Digital Keys in 2025.pdf
PDF
Mobile in your organisation
PDF
Bolstering the security of iiot applications – how to go about it
Going Passwordless with Microsoft
Android vs iOS encryption systems
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
How to Secure Your iOs Device and Keep Client Data Safe
Cyber Security Seminar
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
EMFcamp2022 - What if apps logged into you, instead of you logging into apps?
Final Research Project - Securing IoT Devices What are the Challe.docx
INSECURE Magazine - 35
Basic Digital Security
Jitter Bugslec
Social Engineering and Identity Theft
Entreprises : découvrez les briques essentielles d’une solution IoT
Iron Bastion: How to Manage Your Clients' Data Responsibly
Public - Cybersecurity awareness presentation (1).pptx
Forensic And Cloud Computing
The Safest Way To Interact Online
Password Overload_ Smart Ways to Manage Your Digital Keys in 2025.pdf
Mobile in your organisation
Bolstering the security of iiot applications – how to go about it
Ad

More from CHRDnet (11)

PDF
給香港抗爭者的數位安全小指引
PDF
Torture brochure web version
PPTX
Harsh Climate for Human Rights Defenders in China:2014 in Photos 中国大陆人权捍卫者面临严...
PPTX
Black Jails (illegal detentions) in China
PPTX
CHRD’s image gallery of the year in human rights defense in China
PPTX
Final slideshow hrd 2013 report
PPTX
Hr day 2012 ed
PPTX
The death of hezhihua
PPTX
Rtl photo gallery sep2012
PPTX
The darkest corners image gallery final
PPTX
The Darkest Corners - Image Gallery
給香港抗爭者的數位安全小指引
Torture brochure web version
Harsh Climate for Human Rights Defenders in China:2014 in Photos 中国大陆人权捍卫者面临严...
Black Jails (illegal detentions) in China
CHRD’s image gallery of the year in human rights defense in China
Final slideshow hrd 2013 report
Hr day 2012 ed
The death of hezhihua
Rtl photo gallery sep2012
The darkest corners image gallery final
The Darkest Corners - Image Gallery

Recently uploaded (20)

PDF
ACHO's Six WEEK UPDATE REPORT ON WATER SACHETS DISTRIBUTION IN RENK COUNTY - ...
PDF
An Easy Approach to Kerala Service Rules
PDF
Item # 7 - 2025-26 Budget 2025 Ad Valorem Tax
PDF
Landscape quality objectives based on social perception. The experience of th...
PDF
The GDP double bind- Anders Wijkman Honorary President Club of Rome
PDF
Item # 8 - 218 Primrose Place variance req.
PPTX
Nasarawa_Youth_Unemployment_Proposal.pptx
PDF
PPT Items # 3&4 - Residential Haunted House
PPTX
Civil Society Engagement in National Adaptation Plan Processes
PDF
The Landscape Catalogues of Catalonia. From landscape characterization to action
PDF
PPT Item # 9 - FY 2025-26 Proposed Budget.pdf
PPTX
cpgram enivaran cpgram enivaran cpgram enivaran
DOCX
Diplomatic Studies and Migration- Global Perspectives and Practices.docx
PDF
PPT Item # 8 - Pool Pocket Staff Report
PDF
Redefining Diplomacy: Françoise Joly on Navigating a Multipolar Order
PPTX
Core Humanitarian Standard Presentation by Abraham Lebeza
PPTX
Key Points of 2025 ORAOHRA of the CSC from CSI
PDF
PPT Item # 7 - Proposed Budget and Tax Rate
PDF
Item # 1a - August 11, 2025 Meeting Minutes
PPTX
20231018_SRP Tanzania_IRC2023 FAO side event.pptx
ACHO's Six WEEK UPDATE REPORT ON WATER SACHETS DISTRIBUTION IN RENK COUNTY - ...
An Easy Approach to Kerala Service Rules
Item # 7 - 2025-26 Budget 2025 Ad Valorem Tax
Landscape quality objectives based on social perception. The experience of th...
The GDP double bind- Anders Wijkman Honorary President Club of Rome
Item # 8 - 218 Primrose Place variance req.
Nasarawa_Youth_Unemployment_Proposal.pptx
PPT Items # 3&4 - Residential Haunted House
Civil Society Engagement in National Adaptation Plan Processes
The Landscape Catalogues of Catalonia. From landscape characterization to action
PPT Item # 9 - FY 2025-26 Proposed Budget.pdf
cpgram enivaran cpgram enivaran cpgram enivaran
Diplomatic Studies and Migration- Global Perspectives and Practices.docx
PPT Item # 8 - Pool Pocket Staff Report
Redefining Diplomacy: Françoise Joly on Navigating a Multipolar Order
Core Humanitarian Standard Presentation by Abraham Lebeza
Key Points of 2025 ORAOHRA of the CSC from CSI
PPT Item # 7 - Proposed Budget and Tax Rate
Item # 1a - August 11, 2025 Meeting Minutes
20231018_SRP Tanzania_IRC2023 FAO side event.pptx

Digital Security Tips for Hong Kongers

  • 2. November 2020 Copyright©ChineseHumanRightsDefenders20202 There is no perfect way to protect yourself online. No tool can completely protect you. However, you can adopt some tools and behaviors to try and mitigate some risks.
  • 3. November 2020 Copyright©ChineseHumanRightsDefenders20203 Some Questions to Ask Yourself • What do I want to protect? • Who do I want to protect it from? • How bad are the consequences if I fail? • How likely is it that I will need to protect it? • How much trouble am I willing to go through to try to prevent potential consequences? More on how to develop a personal security plan from Electronic Frontier Foundation (English): https://ssd.eff.org/en/module/your-security-plan
  • 4. November 2020 Copyright©ChineseHumanRightsDefenders20204 Risks in Hong Kong Hong Kong has high physical security risks, which make digital security risks greater as police can obtain devices and/or physically force access. Police can stop and search anyone on the street for no cause to check ID Police can search properties without a warrant under the new National Security Law’s implementing rules Authorities can prevent a person suspected of “endangering national security” from leaving Hong Kong
  • 5. November 2020 Copyright©ChineseHumanRightsDefenders20205 Surveillance Risks Your phone is a tracking device. It always sends location info to the phone company. Police can likely access that data. GPS/location services can store data on where you have travelled on your phone including metadata on photos. If you are detained, police could access it and know your movements.
  • 6. November 2020 Copyright©ChineseHumanRightsDefenders20206 Tips to Protect Yourself Try to limit your use of your phone. - Viewitonlyasacommunicationdevice. - Don’tsavealotofmessagesandemailson it. - Don’tdownloadorstoresensitive filesonit. Use strong end-to-end encrypted apps with disappearing messages. For extra sensitive trips, consider leaving your phone at home or covering it with a faraday bag/two layers of aluminum foil.
  • 7. November 2020 Copyright©ChineseHumanRightsDefenders20207 8 Tools for your Digital Security Passcode Password Manager Virtual Private Network (VPN) Encrypted Messaging Apps Secure Email – Protonmail Encryption – Files and Cloud Storage Delete Files Advanced – GPG Encryption
  • 8. November 2020 Copyright©ChineseHumanRightsDefenders20208 Passcode iPhone 01 Do not use face recognition and Touch ID as they can be easily used to open your device Change your passcode to over six-digit (ideally 10 digits). If have iPhone 5S or later, full disk encryption is automatically turned on once you have added a passcode.
  • 9. November 2020 Copyright©ChineseHumanRightsDefenders20209 Passcode iPhone 01 Make sure USB Accessories is toggled off to prevent access to your device through a USB cable Can set up phone to erase all data after 10 failed passcode attempts
  • 10. November 2020 Copyright©ChineseHumanRightsDefenders202010 Passcode Android 01 Android phones have different system settings, but most have passcode option under lock screen. Don’t use any smart lock options
  • 11. November 2020 Copyright©ChineseHumanRightsDefenders202011 Passcode Android 01 Make sure to use a pin or password as those are the most secure Be sure to turn off biometric unlock options.
  • 12. November 2020 Copyright©ChineseHumanRightsDefenders202012 Password Manager 02 • A strong password for each account is one of the best tools you can use to protect yourself online • Most people cannot remember multiple passwords and use the same password for several accounts. This is extremely insecure! • Password managers help you to have a strong, secure password for all your accounts • Only need to remember one password Recommended application: KeePassX https://www.keepassx.org/ More on passwords: https://ssd.eff.org/en/module/creating-strong-passwords
  • 13. November 2020 Copyright©ChineseHumanRightsDefenders202013 Virtual Private Network (VPN) 03 • Install and use VPN on phone and computer • Especially important to use VPN whenever connecting to free public WiFi • Your device could be accessed through a free public WiFi connection. Any WiFi without a password is insecure and puts your phone at risk of being hacked • Some resources to help select a VPN: https://freedom.press/training/choosing-a-vpn/ https://thatoneprivacysite.net/ • More advanced users can consider using Tor Browser (computer and Android only)
  • 14. November 2020 Copyright©ChineseHumanRightsDefenders202014 Encrypted Messaging Apps04 Wire wire.com Signal signal.org WhatsApp whatsapp.com Telegram telegram.org End-to-end encrypted (E2EE) ✔ ✔ ✔ Not by default Disappearing messages ✔ ✔ ✖ ✔ Can register with email ✔ ✖ *Can use VoIP number ✖ *Can use VoIP number ✖ *Can use VoIP number Passcode for app ✔ ✔ ✖ ✔ Can remove group members ✔ ✔ *New group only ✔ ✔ Channels to distribute content widely ✔ Notes: Recommended Recommended Owned by Facebook Incidents in mainland question strength of encryption (e.g. Jiang Tianyong case)
  • 15. November 2020 Copyright©ChineseHumanRightsDefenders202015 Secure Email05 Consider using ProtonMail mail for more sensitive communications and can keep other emails for less sensitive mail Advantages of using a free secure email like ProtonMail: • End-to-end encryption to other ProtonMail accounts • Disappearing emails (timers set by sender), which allows sensitive information to automatically be delete from the inbox/sent folder • Servers which are not run by corporate interests • Two-factor authentication • Easy to use interface that allows for searches and available on mobile app (which allows to set up a Pin to open the app https://protonmail.com/
  • 16. November 2020 Copyright©ChineseHumanRightsDefenders202016 Encryption Local Files 06 Create an encrypted folder on your computer. • Folder can be stored on your computer, external harddrive, or USB. 1. Download and install Veracrypt: https://www.veracrypt.fr/en/Downloads.html 2. Create new volume • Follow tutorial for step-by-step instructions: https://www.veracrypt.fr/en/Beginner%27s Tutorial.html • Note for Mac users: need to have FUSE installed 3. To store files: Open Veracrypt, mount volume (folder), place files inside, and dismount folder. Reminder: If you are detained and your device is seized by police, they can potentially physically force you to decrypt files
  • 17. November 2020 Copyright©ChineseHumanRightsDefenders202017 Encryption Cloud Storage 06 Cryptpad https://cryptpad.fr/ is a free, open source and end-to-end encrypted cloud drive Folder can be stored on your computer, external harddrive, or USB. • Can register anonymous accounts • Limited storage (50MB for free account) • Document/files can be set to disappear
  • 18. November 2020 Copyright©ChineseHumanRightsDefenders202018 Delete Files07 Normally when you move a file to trash, your computer saves a version of it which someone could restore. To permanently remove the file, you need an application which will write over the file. • Further reading: https://securityinabox.org/en/guide/destroy-sensitive- information/ • On Windows: https://ssd.eff.org/en/module/how- delete-your-data-securely-windows • Note for Mac: This cannot be done with newer Mac computers because they use an SSD drive, which cannot be written over. Best bet is to encrypt your files • Explanation: https://ssd.eff.org/en/module/how- delete-your-data-securely-macos#SSDs
  • 19. November 2020 Copyright©ChineseHumanRightsDefenders202019 Advanced: GPG (set up a key) 08 1. Download and install GPG Suite (which includes the GPG Keychain): https://gpgtools.org/ 2. To set up a key: Open up “GPG Keychain” à go to “File” à “New Key” add relevant info including email address and strong password and click “Generate Key” 3. Exchange public keys with trusted partner: Right click and select “export” to generate key file. Do not include secret key in exported file. Send your public .asc keyfile to other people to encrypt files and emails with them 4. When you receive a key, double click the .asc file to import into your GPG keychain 5. Exchange fingerprints to verify key. Afterwards, double click on imported key after confirming fingerprint and set ownertrust to “full”. Make sure to NOT upload your key to the keyserver when given this prompt.
  • 20. November 2020 Copyright©ChineseHumanRightsDefenders20202 0 Advanced: GPG (encrypted emails and files ) 08 After installing GPG Keychain and creating a key... 1. Right click file you wish to encrypt, go to services and select “encrypt file”. 2. Select key and click encrypt. 3. Your file is encrypted. It needs the secret key and password to be decrypted. 4. Can encrypt it with your own key but someone with access to your computer can decrypt this file.