Creating and Managing Self-encrypted Contact Lists
Cipher Contact List Management
To avoid memorizing or managing multiple private keys, public keys, and structured channels per contact, Cipher lets users create a self-encrypted contact list. This reduces cognitive load and centralizes contact configuration securely and locally.
Step 1: Generate Your Master Identity
Start by creating a single, dedicated keypair — one private key and one public key — that you will use solely for encrypting, storing, and unlocking your contact list. This keypair should be stored in multiple secure locations. It must never be shared with anyone, including the public key.
Step 2: Design a Memorized Structured Channel
Create one complex structured channel using mnemonics only you understand. This should never be stored physically or digitally. For help, refer to the [Cipher Channels Explained] section.
Step 3: Build the Contact List Format
Use the following structure directly inside the encryption interface of Cipher — in the “Encrypt / Decrypt Message” input field:
{
"Contact 1": {
"canal": "111111-111111",
"privKey": "bcfdc0826504",
"pubKey": "02afa51dfecd",
"recipientPubKey": "02c1750b7d10"
},
"Contact 2": {
"canal": "222222-222222",
"privKey": "ab12cd34ef56",
"pubKey": "99aabbccdde0",
"recipientPubKey": "0454k6d25b19"
}
}
Add additional contacts between existing entries.
Step 4: Encrypt and Save the Contact List
Paste this structure into the message encryption field of Cipher. Use your master structured channel and keypair to encrypt it. Save the encrypted result as a .0fx
file and name it contacts.0fx
.
Step 5: Load and Use Your Contact List
Load your
contacts.0fx
file into Cipher.Input your master keypair and memorized structured channel.
Decrypt the file and copy the decrypted JSON output.
Paste the decrypted result into the Add JSON Contact List section.
Cipher will auto-detect the structure and display a dropdown menu with all available contacts.
Modify Contacts
Decrypt
contacts.0fx
.Add, edit, or remove entries inside the Cipher interface.
Re-encrypt the updated content.
Save again as
contacts.0fx
to overwrite the old list.
This model provides persistent, secure, local contact management without servers, storage risk, or friction — preserving all encryption capabilities while removing operational complexity.
Last updated