Andreas Fuss Abogado & Rechtsanwalt

Contact I Encryption

Confidence and confidentiality are two different things. We have therefore compiled some information about encryption when communicating by email … for you to be confident that your information remains confidential.


Our public key





Please send us your public by email to info(at)leywerk.es.




Frequently asked questions about encryption

Why is encryption important?

What is end-to-end encryption?

What is the difference in transport encryption?

Which encryption standard do we use?

How does end-to-end encryption work?

How do you get your encryption key?

How do you exchange your public key with us?

What is the fingerprint of a key?

What do you need to set up your device?

Does end-to-end encryption work with a smartphone or tablet?

Is it possible to use end-to-end encryption without an email client?

What are the alternatives?

What should you always take into account before sending emails?


Note: Please take into account that we are a law firm and that we do not provide technical assistance regarding encryption. We assume no responsibility for the content, the integrity, and timeliness of the provided information herein. The same applies to security, up-to-dateness and/or usability of the mentioned technical solutions, e-mail-providers and software for the encryption of emails and data, to which we cannot make any recommendations. Any link or reference to websites belonging to third parties is for information purposes only. We do not assume any liability for the contents, the accurateness of the information and the opinions expressed on those websites that are out of our control and do not reflect our own opinion.



Why is encryption important?

Emails are similar to a postcard. When transmitted over the Internet, the e-mail can be read and the content or sender information be modified. You should send therefore unencrypted e-mails only when you are ready to take that risk.

However, confidential communication requires encryption providing the highest level of protection end-to-end encryption.

To the top



What is end-to-end encryption?

End-to-end encryption is a method of secure communication that encrypts an email over its entire transmission path from the sender to the recipient avoiding that its content is available in plain text on intermediate or end servers and thirds may read or change it. For this, the email client or webmail of the sender and recipient must have a corresponding function.

To the top



What is the difference in transport encryption?

The standard technology used in transport encryption, Transport Layer Security (TLS), more widely known also under the previous name SSL (Secure Sockets Layer), encrypts 'only' the transmission channel when sending emails; but not the content of the email.

This means that the transport between two email servers (SMTP) is encrypted; but without further measures not the email on the email server of the sender or the recipient. Here the data is available in plain text, at least for a short period to time.

This is more more a less like this:

If you check-in your luggage it is unlikely that happens something during the flight (transport). Your luggage is in the storage space of the aircraft and is protected. However, at the departure and arrival airports everyone can access your luggage (unauthorized).

In the case of transport encryption, the luggage is your email. It is protected during the flight (transport) but without further technical measures not at the airport of the place of departure (server of the sender) or the place of arrival (server of the recipient). 

This is different with end-to-end encryption. The luggage - the email - is placed in a secure container on departure, stowed in the aircraft and only the recipient can open the container upon arrival. The luggage - the email - is protected from end-to-end.

Transport encryption is therefore useful and you should activate it. For sensitive data, however, you should not rely on this and additionally encrypt the email end-to-end.

To the top



Which encryption standard do we use?

We use OpenPGP (openpgp.org). This is arguably the most wideley used encryption standard since 1997. OpenPGP is available for all important operating systems such as Windows, Mac OX, GNU/Linux, Android and iOS and it is free and compatible with PGP - the standard OpenPGP originally derived from.

To the top



How does end-to-end encryption work?

Both sender and recipient of the e-mail have two keys: a public key and a private key.

The public key is used to encrypt the e-mail. The sender encrypts his e-mail with the recipient's public key and vice versa. That's why we need to exchange our public keys once.

The private key is used for decryption. This key remains with you and must be kept secret and carefully because without your private key you can not read the e-mail. You should therefore make a backup copy of the private key and save the password.

To the top



How do you get your encryption key?

You can generate and manage your key yourself. To do this, you must install an extension in your email client (vid ‘What do you need to set up your device?’).

To the top



How do you exchange your public key with us?

Our public key can be downloaded under the following link:

Our public key

Futhermore you can search and download our public keys from the usual key serves on the internet (e.h. onpool.sks-keyservers.net).

Please send us your public key by e-mail to info(at)leywerk.es. You just have to open and send us an email. You don’t have to do or to attach nothing more. Our system detects the attached key automatically.

For more information on the exchange of keys, please see https://www.gnupg.org/gph/en/manual/x56.html.

To the top



What is the fingerprint of a key?

Each key has a fingerprint. This is a random sequence of numbers and letters created to verify the authenticity of a key. Also, it helps to differentiate several keys for the same email address. Please match the fingerprint that we publish on our website.

To the top



What do you need to set up your device?

You need an email client that supports encryption (for example, Outlook, Thunderbird, Mail). Many email clients have easy-to-use extensions. For example, for Outlook is available the plug-in Gpg4win (gpg4win.org); for Mozilla Thunderbird the add-on Enigmail (enigmail.net) or for Mac users who use the app Mail, the GPG Suite (gpgtools.org). 

To the top



Does end-to-end encryption also work with a smartphone or tablet?

There are available extensions for smartphones and tablets, for example, the apps iPGMail or PGP Everywhere for iPhone and iPad. Check your app store.

To the top



Is it possible to use end-to-end encryption without an email client?

Some webmail services such as Gmail, GMX, mailbox.org, Posteo, or web.de offer end-to-end encryption that works with an easy-to-use web browser extension such as Mailvelope.

Furthermore, some webmail service providers offer server-based end-to-end encryption that does not need any extension (i.e. startmail.org, protonmail.com). The advantage is that you don’t have to care. You can send e-mails normally even when the recipient does not use encryption. This solution works with passwords and the recipient can use a link to read the email. The cons are that the provider has the private key and the comfort for the recipient is good, but not the best.

To the top



What are the alternatives?

It’s possible to send confidential data in encrypted attachments. PDF or Word documents, for example, can be password protected and encrypted. The password can then be transmitted to the recipient in a different way, e.g. by phone. This is easy to implement, albeit less secure than end-to-end encryption because the email itself is not encrypted. The text of the mail is therefore accessible. However, the attachment is secure.

To the top



What should you always take into account before sending emails?

Nothing is 'unhackable' and confidentiality is a precious good. If you have any confidential information or documentation for us, we recommend you to send it to us by regular mail or courier or to hand it over to us personally. Although this might be old-fashioned, it is always safer than sending an email, even if it is encrypted.

To the top
















Email                                                                                    

info(at)leywerk.es

Identification (keyID)

0x6F6676B2

Fingerprint 

44EC 0CAC AAA7 8D69 3F33 26C3 C57B 018B 6F66 76B2

Download

You can download our public key here: PGP-Key (*.asc)


-----BEGIN PGP PUBLIC KEY BLOCK-----

Comment: GPGTools - https://gpgtools.org


mQINBFpbQMABEADRMfMuAQeCmSIcVrow8gw6osCfwHQ2TNLt5HsZhODrsdwXE1gZ

ZR6GxXsMIOlTI9+B8pu7gTHT4rh+DWaGX8XpgMh/N87Dv2ai9ydaU+ur7KSSo68s

fpbVmVgOUkiR2lWq8AcuPyOpbR2eH2HPzMUxaRzBQMPLxDvvSGOqacQOg28KJ+7K

N3szI4g4S9DAzrfNxfICbqBQwjAiz4461kQDrODb2j0dOHN43N8qUqVjxRjwim/S

Np/nzMdHS74fqTkTTTgporb6zNqck79VXeVCiHAhXgbJyOXPIG+dAvOmFLM15a6I

1OxGjgx+VZJkdW/KpRcA7uqSojdtCLtRhqzncFgUtbrtulXOgLjpJ/PSSVsriW+I

QGj+qkefXwAQQM7yP57s3HjgVIy/YmZUbXqznXPeR6LLpqss0Mo0H8c6akXBmvAQ

GxSquTSIgQKB/bd2HtNtWVMuAzvdjWNC5+9hUN5LcovTzjsu4stp8rxurIr0mALs

zby2LfKWVyrfdDnpEAUqdfRqAjyKwDZfeLTCRtBOt2WGGj1npLKhgwS7zePg0+ZR

N7+TLBOz2fA3cmaMh/MeLnmBQ0nSgpZzl8FzcS6Q5Hv5ZWBknYcFuolf4fb2NaEh

sl+Ks3J1yOSajpxFHHyK5siNb2R/MfbXDE9vx4uSEov/ynhG8UYnIhwAxQARAQAB

tChMZXl3ZXJrIExlZ2FsIFNlcnZpY2VzIDxpbmZvQGxleXdlcmsuZXM+iQJOBBMB

CgA4FiEEROwMrKqnjWk/MybDxXsBi29mdrIFAlpbQMACGwMFCwkIBwMFFQoJCAsF

FgIDAQACHgECF4AACgkQxXsBi29mdrJmjw/9H2oqjAn038NY+p0stt2Lfowb6Z8+

hs4UggiIFznHhgkWT8NHs6/Ju7b6Kqd4cDxF01yLY0Ca4/pU5jknf7+/Fo7YhiSJ

YuPZy9sQOGOUuBaRDPZHTWMewBSlrJqX8Dy6SP1tSDRr7VVHJeiBF8P/t9KoPA6Z

X/o9YbRFz4/fv7nue20qEAvuRBFj+uH896K02hoTTQM06hvCrXFz0FxfsvIwKAua

Zf0NnUcm+jHsskDJdHZ+2vJmcAg9UI0Y3IxMdKRrcpqINV1Kb+RgaMCLW6e5qOra

3r29U3j4zzG5OmX0RJcSwycBMvz98vePu31lEniH0S4CPfmuqwemBfycXqWje3ii

x6jnpHI5aXp//R6zi7GCfA4djT3+p5sWHL2t4ISvSboH/yQFAqpF6abJpob+2s6f

dqn5rRWRzeFJRmlw8ttbKxYeod1Q4+5gUq8HI3ga1Qo9/fz7EezEPXT4eYa6Obo/

nSZVkIYpww6NZmTUJ0Csh3gga/pUA/NN3J0TdyVoQxBqhmOk5cR3A6c//fzA+Ogc

wbRT/ofWzT3FoBC9G26elTh/74RaJSqOH+S65zAWWl3MtlOciW4XsZVbdWkiMCzL

kYUJqyT8Xo0iU19oVO0d1QMApxwQO0ljkk3EfZwHeoOCsf1ag0aDin3sKKvYUwiA

CQ+6iY1jNRXftdS5Ag0EWltAwAEQAMthzM8cU35PC/9AWCfikZYsUFZwJr+DQoOU

v3du8xQBCK1mMXOgMv11W2DwH3ihoJ9RqPI/SCQjFI3TQWm6R2qh0dlGXlomiMTv

B3HAv4aYQMhIFdRLimVhQyQN5qEUqbuWxTEHKLnC2HOOkh2ZY+582QyEKL4OItUt

dn7RTIsXdzI57mfLOdJenv0FyxaNTBSD3smn8nhJJ75o0e3MIVqZkoY2Lwcitsn1

eW866WuX3qfBFwOWRoObtQZw2fDJAKGmn1r6oVUjD2eZyjetoAn/dIwFe+U7SRQo

LCCqQvwzEGmoBfPxsytH1SZ0vaAKJUbyDi+dkN3Q7wXqwlNUwHqxjLKyZ9jJRf8T

cNC7c1V3GTJ1A2mDdqotVco/KBIAz4nGT5BaWbftQ+vA1eCOASSFg/NancTm57GH

Lu0+MFAbjjf9FecBkKXAg+toe6CXS6cT1T68wc6zq0Ll+NFjM9miWb3KT26uGbio

XfQFIYIvor2P7rZ4il0kGW2MgBh3Jv61iHWiETVrgbm+NmtUkEvAjjg7FAnH0yp0

llzZXIGBZ7yfI1rDa05AvgGQJB4XNvZyacQyCWkz7Xy6VZVjf71VqNAeXEeSqGCZ

WCd+o4qScnVK5+h8lbcem4IU0Kf76b/YVosklhumR7rZAotcKF8XfJ2rOEPNNRPV

HnVM+f/PABEBAAGJAjYEGAEKACAWIQRE7AysqqeNaT8zJsPFewGLb2Z2sgUCWltA

wAIbDAAKCRDFewGLb2Z2skRdD/0YKtq+/wYb/Ob5jWy5LMVFamcHjNYSX6mHR3yr

wj0j8ZvN2x4smofBS1mTkBUMnqkZIygRYkf1NRtG4GknPuyAa98GB2kCTDGX+wAv

aeJA7uu6MLjf2MpWQSUK4PSOHK/tp2WJZK7P39doRJVOxtbcp9rD+fU33bjjw3m8

Zv3WRt7wG/OMipdYGj+Bpc6wL1rdiekYntU2m+Pl0JduJtBR8BwbvHjRBvYjbbGd

Gq3FI9RGTeVhEJ5Yws+138VHa1otHi2xnla3YyFpUaLr8cLZo2nAb1RijMM595US

eWDR8jSDEaY378dQN7Ek2ta/jAmMC99iwLilHUrHZfT9Bh4589g+CiQuRAabKkB8

5l0qHC0oKYo7jLBY+/lQQixhglzh9qA2kvodTL+C6q2MUCZ9JwUDmRvS9tSWkdrb

FcGwXGOc5jjSZ5zn1tbD16FZgYP7LOC/4FnmG/cIFkvODjUMVVZGfKphICYDeI1o

t8sWt7SEcoNmgr6j0WfMTDvrP/WGJnpTf3ZXnKokSmdt6TrHMnpYW8mgbTbs/w0t

cDNCtyedKOyfeTNUutP9OzqA4nRpdoT/ep/UmYuKn+fSJfH8py8nxbXZJCek5VVb

7KvHQzhL2+G2HjSd0+PCwjH46xihYr5Cb5iCz2GVEdbSAf7nZxzD0nQMQP2Z+oqP

keFGmQ==

=muTF

-----END PGP PUBLIC KEY BLOCK-----

Information about key exchange

Please send us your public key by email to info(at)leywerk.es.

 You can find further Information on key exchange under the link

https://www.gnupg.org/gph/en/manual/x56.html.

More information














Our public key

© Copyright

Andreas Fuss Advocat & Rechtsanwalt 2020