
Wait until the changes have been synced by your cloud provider.Move the encrypted folder to the parent folder.Copy the existing unencrypted files to the encrypted folder.Right-click the encrypted folder → Boxcryptor → Manage Permissions.Share the unencrypted parent folder in your cloud provider.Copy the new files to the encrypted folder.Add the groups or users you want to share the file or folder with and apply the changes.Right-click the file or folder → Boxcryptor → Manage Permissions.Create a new encrypted folder in the parent folder.Create a new unencrypted parent folder.It is recommended, to not directly share an encrypted folder but rather place the encrypted folder in an unencrypted parent folder and share the unencrypted parent folder - especially when using filename encryption. If you add a file to a shared folder, the persons who you shared the folder with can access the file now, too.Įncrypted and permission to access for AliceĮncrypted and permission to access for BobĮncrypted and permission to access for Alice and Bob Just as the inheritance of encryption properties, permissions are inherited from the parent folder as well.

If you share access to multiple files, make sure that they are all synchronized completely. Keep in mind that it must be synchronized by your cloud provider. Note: Every time you share a file, the file is modified. If you share the file with somebody, the key will be encrypted with the Boxcryptor account of the receiver and stored in the file as well. The key is encrypted by your Boxcryptor account and is stored within the file itself.
SHARE FILE HOW TO
Please check your provider’s documentation on how to share files or folders with others.

For programs and humans the encrypted information is rendered useless. If you encrypt a file, however, the information inside the file is modified. Such a file can be read or modified by anyone who has physical access. If you store an unencrypted file on your device or in the cloud, the program you store it with saves the file and the information inside. For understanding how the sharing of encrypted files works, it is helpful to understand how programs handle unencrypted and encrypted files.
