The encrypted archive remains accessible, but actually reading it requires a key only the client holds. This neutralises most email account phishing attacks.
The encrypted archive remains accessible, but actually reading it requires a key only the client holds. This neutralises most email account phishing attacks.