SecureMint

How to Receive and Decrypt an Encrypted File

Received an encrypted file but not sure how to open it? This guide walks recipients through decrypting files shared via SecureMint — whether it's a self-decrypting HTML, a .enc file, or a shared link. Everything happens in your browser with zero installs, and the sender's zero-knowledge setup means no third party ever sees your file.

SecureMint uses zero-knowledge design. The server cannot read your data.

Steps

1

Identify the file type you received

Check whether you received a self-decrypting .html file, a .enc file, or a SecureMint share link. Each has a slightly different decryption flow, but all work in a standard browser.

2

Open it in your browser

Self-decrypting HTML: double-click to open. .enc file: go to SecureMint /receive and drop the file. Share link: click the URL — the decryption key is in the URL fragment and never sent to the server.

3

Enter the password from the sender

Type the password shared by the sender through a separate channel (phone call, chat, etc.). Decryption runs 100% in your browser via AES-256-GCM.

4

Download the decrypted file

Once decryption succeeds, the original file is restored and downloaded automatically. AES-GCM authenticates the file, so any tampering is detected.

Why It's Secure

  • Always receive the password through a separate channel from the file itself (never in the same email).
  • Verify the sender's identity before opening — phishing can deliver fake encrypted files too.
  • Self-decrypting HTML files work completely offline — verify by disconnecting from the internet.
  • Check file integrity: AES-256-GCM automatically rejects tampered ciphertext.

FAQ

Do I need to install anything to decrypt?
No. Any modern browser (Chrome, Safari, Firefox, Edge) can decrypt SecureMint files. No apps, no accounts, no plugins.
I lost the password — can I still open the file?
No. Zero-knowledge encryption means there is no backdoor. Contact the sender to resend with a new password.
Is it safe to open an unknown encrypted file?
Encryption protects confidentiality, not authenticity of the sender. Verify the sender first — encrypted malware is still malware.