Confidencial Documentation
HomepageLog In
  • Getting Started
    • Sending secure PDFs with Confidencial
    • Viewing secure PDFs with Confidencial
    • Sending secure Word docs with Confidencial
    • Viewing secure Word docs with Confidencial
    • Sending secure Excel workbooks with Confidencial
    • Viewing secure Excel workbooks with Confidencial
    • Sending secure images with Confidencial
    • Viewing secure images with Confidencial
    • Sending secure messages with Confidencial
    • Viewing secure messages with Confidencial
    • Protecting content with Confidencial
    • Re-encrypting and changing who can see protected content
  • General
    • How Confidencial Works
      • What is End-to-End Protection
      • In-doc encryption
      • The Confidencial Public Key Registry
      • The Confidencial Private Key Server
      • The Confidencial Log Server
    • Account types
      • Individual
      • Organization
      • Organization administrator
    • File types
    • Key types
      • Cloud-stored keys
      • Device-stored keys
      • Temporary keys
      • Enterprise keys
      • Recovery keys
    • Logging in to the desktop or web app
    • Logging in to Confidencial
    • Encryption policies
    • Selecting encryption recipients
    • Inviting other users to Confidencial
    • Accepting an invite to Confidencial
    • Creating a Confidencial individual account
    • Re-encrypting and changing who can see protected content
    • Confidencial organizations
  • Web App
    • Encrypting a message
    • Decrypting a message
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
    • Re-encrypting a Confidencial-protected file or file bundle and changing who can see them
  • Desktop App
    • Installing the desktop app
    • Encrypting files and folders
    • Decrypting a .c11 file or .c11.zip file bundle
  • Microsoft Office Add-ins
    • Installing the Microsoft Office add-ins
    • Opening the task pane
    • Logging in from an Office application
    • Encrypting an entire Word document
    • Encrypting parts of a Word document
    • Decrypting a Word document
    • Re-encrypting a Word document and changing who can see protected content
    • Installing Microsoft Add-ins via the Admin Center
  • Advanced Features
    • Storing keys on your device
    • Loading a key from your device
    • Creating a machine token
    • Obtaining public-private key pairs for use with the Confidencial SDK
  • How to Use Secure Document Request (SDR)
  • Secure Document Send
    • Sending Documents with Secure Document Send
    • Viewing Historical Document Sends
    • Creating a Persistent Share Link
    • Receiving a Persistent Share Link
  • Cloud Protector
    • Connecting AWS S3
    • Connecting Box
    • Connecting Dropbox
    • Connecting Google Cloud
    • Connecting Google Drive
    • Connecting Microsoft Azure Blob
    • Connecting Microsoft OneDrive
    • Connecting Microsoft SharePoint
    • Connecting Server Message Block
    • Connecting Wasabi
    • Connecting On-Premises Storage
  • Enterprise Deployment
    • Connecting your identity provider to Confidencial
    • Creating an S3 bucket for document requests
    • Creating a Cognito user pool to enable S3 bucket access via IDP credentials
    • Deploying the Confidencial Key Server in your environment
      • Configuring an AWS Elastic Container Service (ESC) instance
    • Running a database migration
    • Pushing a container image to your AWS container registry
    • Connecting your identity provider to the Confidencial Key Server
    • Deploying the Confidencial Desktop App to your enterprise users
    • Deploying the Confidencial Office Add-ins to your enterprise users
    • Setting up Microsoft Entra to use an Exchange account to send email notifications
  • Organization Administration
    • Adding members to an organization
    • Pre-loading members into your organization
    • Designating a member as an administrator
    • Creating a recovery key for an organization
    • Monitoring Confidencial usage within an organization
    • Organization-level policies
    • Administrator permissions
  • Command-Line Interface (CLI)
  • Software Development Kit (SDK)
  • Contact Us
  • System Requirements
  • Legal/Licensing
  • How to Access Confidencial Documents for First Time Recipients
Powered by GitBook
On this page
Export as PDF
  1. Getting Started

Sending secure images with Confidencial

PreviousViewing secure Excel workbooks with ConfidencialNextViewing secure images with Confidencial

Last updated 1 month ago

ℹ️ Let’s say you’re Happy Traveler, a tourist preparing to make a trip overseas. At your destination hotel, The Example Hotel, Bob at the front desk has asked for a photo of your passport. You understand the , and don’t want to subject yourself to possible identity theft.

Fortunately, you don’t have to do this anymore. With Confidencial, you can add a layer of protection to your image that ensures it will be “end-to-end encrypted.” That is, the whole time the image is on your machine, the whole time it’s on your recipient’s machine, and at all times in between, the image can stay protected.

Let’s see the modern way to securely share a photo…

  1. Open the Confidencial or go to and if you haven’t done so already

  2. Drag your passport photo on to the encryption box of the Encryption Tools page

  3. The photo will open in the Confidencial Image Protector. in the right taskpane. You can do so by entering his email address, or, if you’ve sent to him before, click in the input box to show a list of your recent recipients.

    💡 If Bob has never used Confidencial before, you will be asked to invite him after you enter his email address. Simply click the green invite button. Bob will be able to view your protected photo as soon as he verifies his email address with Confidencial.

  4. You and Bob are now in the recipients list

    ℹ️ The recipients list determines who can view protected content. You are automatically added as a recipient of any message or file you encrypt, so you will always be able to decrypt any message or file you protect.

  5. Select a sensitive part of the photo by clicking and dragging a box over it

    ℹ️ The Confidencial Image Protector currently supports PNG and JPEG images. Other image types can be encrypted using Confidencial’s “C11” file format (). support for other image types is coming soon.

  6. Click Encrypt Selection in the right taskpane

  7. The selected portion is now protected. Repeat Steps 5 and 6 for each portion you’d like to protect.

  8. Click the download (save) button to save the protected image to your disk

    💡 Pro tip: When you download (save) the image, you can overwrite the original version of the image. Doing so will replace the original, unprotected image with a protected, Confidencial image.

  9. Now that you’ve saved your Confidencial image, send it to Bob however you like. You can use email, iMessage, Slack, Teams…any method you prefer. Since access control is built directly into this image, Confidencial’s protection stays with it no matter where it goes or how it gets there.

✅ You’ve now sent your passport the safe way - the Confidencial way! If any unauthorized user intercepts your message or otherwise gets their hands on your image, below is all they will see. Only your designated encryption recipients (Bob in this example) will be able to see the protected content using Confidencial.

risks of sending sensitive info over plain old email
desktop app
my.confidencial.io
log in
Add Bob to your recipient list
see Encrypting files and folders
“Native”