You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: source/desktop/accessing-vaults.rst
+1-1
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ Click on ``Reveal Drive`` in the Cryptomator window to open the mount location u
55
55
56
56
Even though your files are shown unencrypted in the virtual drive, they are not stored unencrypted on the hard drive but only in `volatile memory <https://en.wikipedia.org/wiki/Volatile_memory>`_
While this increases security, it also makes it impossible to see the original file names and directory structure without decrypting them first.
40
+
When you need to know the original name of a file (e.g. to restore an older version), you can use the ``Decrypt file name`` feature to decrypt the file name.
41
+
42
+
43
+
.. _desktop/encrypted-file-names/decryption:
44
+
45
+
Decrypting File Names
46
+
---------------------
47
+
48
+
.. note::
49
+
50
+
Due to technical reasons, given only an encrypted file Cryptomator can only decrypt its name.
51
+
It cannot compute its cleartext path.
52
+
53
+
You can access this feature from the unlocked view of a vault in the Cryptomator main window.
54
+
On the bottom of the unlocked view, drop files on the "Decrypt file name" zone or click on it.
55
+
A modal window with the encrypted-decrypted-mapping opens.
Working on encrypted data from multiple locations works the same as working on unencrypted data from multiple locations. If there is a synchronization conflict, it is handled similarly to how most cloud storage services deal with conflicts.
4
+
Working on encrypted data from multiple locations is the same as working on unencrypted data from multiple locations.
5
+
If there is a synchronization conflict, it is handled similarly to how most cloud storage services deal with conflicts.
5
6
6
-
When a sync conflict occurs, cloud storage services typically create a conflict file by appending a suffix (e.g., ``(1)``) to indicate that there was a conflict. You then need to determine which file to keep.
7
+
When a sync conflict occurs, cloud storage services typically resolve the conflict by leaving the local file as it is and create an additional, conflicting file with the content from the cloud.
8
+
The file name is the same as the original one, suffixed with a short string (e.g., ``(Created by Alice)``) to indicate it's a different version.
9
+
10
+
Cryptomator handles encrypted files in the same way.
11
+
It detects sync conflicts and appends the suffix from your cloud provider to the decrypted filename.
12
+
If the filename with the conflict suffix is too long, Cryptomator shortens the overall filename.
13
+
If the (decrypted) filename with the conflict suffix already exists, the conflicted file has a simple ``(X)`` suffix, where X is an integer.
| Maximum cleartext of the vault is set to 62 | (Created by Alice on 2024-01-31) | businessPitchForTheGreatIdeaIHadLastNight.odp | businessPitchForTheGreatIdeaI (Created by Alice on 2024-01.odp |
Cryptomator handles encrypted files in the same way. It detects synchronization conflicts and displays the conflicted file with a ``(X)`` suffix, where X is an integer.
9
26
10
27
.. note::
11
28
12
-
Sync conflicts can happen in cloud storages for several reasons. In such cases, it is up to you to decide what to do with the conflicted files. It is recommended to manually check both files and determine which one to keep. If you conclude that both files are identical, you can delete one copy. The organization of your files is entirely in your hands.
29
+
Sync conflicts can happen in cloud storages for several reasons.
30
+
In such cases, it is up to you to decide what to do with the conflicted files.
31
+
It is recommended to manually check both files and determine which one to keep.
32
+
If you conclude that both files are identical, you can delete one copy.
33
+
The organization of your files is entirely in your hands.
13
34
14
35
Handling Sync Conflicts
15
36
-----------------------
16
37
17
-
1. When a sync conflict is detected, Cryptomator will display the conflicted file with a ``(X)`` suffix, where X is an increasing integer.
38
+
1. When a sync conflict is detected, Cryptomator will display the conflicted file with a suffix, as shown in the table above.
18
39
2. Manually review both the original and conflicted files.
19
40
3. Decide which file to keep based on your review.
20
41
4. If both files are identical, you can delete one of the copies to resolve the conflict.
@@ -24,8 +45,11 @@ By following these steps, you can effectively manage synchronization conflicts a
24
45
Example
25
46
-------
26
47
27
-
Suppose you have a file named ``document.txt`` in your vault. In the encrypted vault, this file might be represented with an encrypted name such as ``5TyvCyF255sRtfrIv...83ucADQ==.c9r``.
48
+
Suppose you have a file named ``projectPlan.doc`` in your vault.
49
+
In the encrypted vault, this file might be represented with an encrypted name such as ``5TyvCyF255sRtfrIv...83ucADQ==.c9r``.
28
50
29
-
If a synchronization conflict occurs, it will happen on the encrypted filename. Cryptomator detects unexpected patterns in the encrypted filename and handles the conflict accordingly.
51
+
If a synchronization conflict occurs, it will happen on the encrypted filename.
52
+
Cryptomator detects unexpected patterns in the encrypted filename and handles the conflict accordingly.
30
53
31
-
For example, if there is a conflict with ``5TyvCyF255sRtfrIv...83ucADQ== (1).c9r``, Cryptomator will decrypt the decryptable part of the filename and rename the file to include a conflict suffix. The conflicted file might be renamed to something like ``FHTa55bH...sUfVDbEb0gTL9hZ8nho.c9r``, which corresponds to ``document (1).txt``.
54
+
For example, if there is a conflict with ``5TyvCyF255sRtfrIv...83ucADQ== (Created by Alice).c9r``, Cryptomator will decrypt the encrypted part of the filename and rename the file to include a conflict suffix.
55
+
The conflicted file might be renamed to something like ``FHTa55bH...sUfVDbEb0gTL9hZ8nho.c9r``, which corresponds to ``projectPlan (Created by Alice).doc``.
0 commit comments