{"id":740,"date":"2026-02-09T11:37:22","date_gmt":"2026-02-09T10:37:22","guid":{"rendered":"https:\/\/keypact.com\/?page_id=740"},"modified":"2026-02-17T22:16:22","modified_gmt":"2026-02-17T21:16:22","slug":"hoe-werkt-keypact","status":"publish","type":"page","link":"https:\/\/keypact.com\/en\/hoe-werkt-keypact\/","title":{"rendered":"How does KeyPact work?"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"740\" class=\"elementor elementor-740\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ffdbd7f e-con-full e-flex e-con e-parent\" data-id=\"6ffdbd7f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-51b3db6 e-flex e-con-boxed e-con e-child\" data-id=\"51b3db6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74e382a elementor-widget elementor-widget-heading\" data-id=\"74e382a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">How does KeyPact work?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a2597f4 e-flex e-con-boxed e-con e-parent\" data-id=\"a2597f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-717503a elementor-widget elementor-widget-text-editor\" data-id=\"717503a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p><h2><b>How does KeyPact work?<\/b><\/h2><p><span style=\"font-weight: 400;\">KeyPact is a platform for controlled, end-to-end encrypted communication and file exchange. It consists of four components: <\/span><b>KeyPact Mail<\/b><span style=\"font-weight: 400;\">, <\/span><b>File Explorer<\/b><span style=\"font-weight: 400;\">, and integrations with <\/span><b>Google Mail<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Microsoft Outlook<\/b><span style=\"font-weight: 400;\">.<\/span><\/p><h3><b>KeyPact Mail<\/b><\/h3><p><span style=\"font-weight: 400;\">KeyPact Mail enables end-to-end encrypted email between KeyPact users. This communication takes place entirely within the KeyPact environment and does not go through the public internet.<\/span><\/p><p><span style=\"font-weight: 400;\">Every user has access to:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">a <\/span><b>cryptographically generated email address<\/b><span style=\"font-weight: 400;\"> (bijv. <\/span><span style=\"font-weight: 400;\">(e.g. 109f+2b9819a3de9ca889bc80b3b080d620b0@keypactmail.com)<\/span><span style=\"font-weight: 400;\">)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">a <\/span><b>KeyPact ID<\/b><span style=\"font-weight: 400;\">: a unique cryptographic identity that allows users to explicitly add and accept each other.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">Only mutually accepted users can send messages or share files. Emails from outside can be received at the KeyPact address, but internal communication remains strictly shielded.<\/span><\/p><h3><b>File Explorer<\/b><\/h3><p><span style=\"font-weight: 400;\">In the KeyPact File Explorer, all data is encrypted with <\/span><b>AES-256-GCM<\/b><span style=\"font-weight: 400;\">Files can be viewed and edited directly in the browser, without having to download local copies. This limits unnecessary data duplication and reduces the risk of data leaks, while the platform remains fully device-independent.<\/span><\/p><p><span style=\"font-weight: 400;\">Folders can additionally be secured with a PIN code. Shared files can be revoked at any time.<\/span><\/p><p><span style=\"font-weight: 400;\">When sending or receiving messages via KeyPact Mail, attachments are automatically and structuredly saved in the appropriate folders, such as inbox and outbox.<\/span><\/p><h3><b>Gmail &amp; Microsoft Outlook Integration<\/b><\/h3><p><span style=\"font-weight: 400;\">Users can one or multiple <\/span><b>Gmail and Microsoft Outlook\/Office 365 accounts<\/b><span style=\"font-weight: 400;\"> Linking to KeyPact via OAuth 2.0. This makes the KeyPact protocol available for end-to-end encrypted email communication within these existing mail environments.<\/span><\/p><p><span style=\"font-weight: 400;\">KeyPact exclusively uses <\/span><b>Native APIs<\/b><span style=\"font-weight: 400;\"> from Google and Microsoft and does not store any emails or metadata within the KeyPact environment. Encrypted messages remain visible in the regular Gmail or Outlook mailbox, but can only be decrypted via KeyPact.<\/span><\/p><h2><b>Cryptography and Future-Proofing<\/b><\/h2><p><span style=\"font-weight: 400;\">KeyPact is designed from the ground up as a cryptographic platform, not as an email or file system with \u201cextra encryption\u201d added on. Security is not an addition, but the foundation.<\/span><\/p><h3><b>End-to-end encryptie als uitgangspunt<\/b><\/h3><p><span style=\"font-weight: 400;\">All communication within KeyPact is end-to-end encrypted. This means that only the involved end users have access to the content. Servers, administrators and external parties cannot decrypt messages and files, neither technically nor legally.<\/span><\/p><p><span style=\"font-weight: 400;\">For symmetric encryption KeyPact uses <\/span><b>AES-256-GCM<\/b><span style=\"font-weight: 400;\">a proven and widely accepted standard that provides both confidentiality and integrity protection. This encryption is applied to email messages, attachments, and files.<\/span><\/p><h3><b>Forward Secrecy and the Double Ratchet Mechanism<\/b><\/h3><p><span style=\"font-weight: 400;\">KeyPact makes use of <\/span><b>forward secrecy<\/b><span style=\"font-weight: 400;\"> in combinatie met het <\/span><b>double-ratchet-mechanisme<\/b><span style=\"font-weight: 400;\">, vergelijkbaar met moderne secure messaging-protocollen. Dit betekent dat:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">elke communicatiecontinu\u00efteit werkt met voortdurend vernieuwde sessiesleutels;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">het compromitteren van \u00e9\u00e9n sleutel geen toegang geeft tot eerdere of toekomstige communicatie;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">langdurige observatie of latere sleutelonthulling geen historisch datalek oplevert.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">Hierdoor blijft communicatie beschermd, zelfs wanneer een individueel apparaat of account op enig moment wordt gecompromitteerd.<\/span><\/p><h3><b>Post-quantum sleuteluitwisseling<\/b><\/h3><p><span style=\"font-weight: 400;\">Voor de sleuteluitwisseling past KeyPact <\/span><b>ML-KEM-1024<\/b><span style=\"font-weight: 400;\"> toe, a post-quantum cryptographic algorithm that is resistant to attacks from future quantum computers.<\/span><\/p><p><span style=\"font-weight: 400;\">This is a fundamental distinction from classical solutions that rely solely on RSA or elliptic curve, which are known to be vulnerable to quantum attacks in the long term. By combining ML-KEM-1024 with existing, robust symmetric encryption, a <\/span><b>Hybrid and future-proof cryptographic architecture<\/b><span style=\"font-weight: 400;\">.<\/span><\/p><h3><b>What this means in concrete terms<\/b><\/h3><p><span style=\"font-weight: 400;\">For organisations, this means that:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">confidential communication remains protected in the long term;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">compliance and policies are not dependent on cloud providers or foreign jurisdictions;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">encryption is not an optional feature, but structurally enforces that data is only accessible to authorised parties.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">KeyPact therefore offers not a temporary security layer, but a cryptographic foundation designed for long-term use in critical and sensitive environments.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Hoe werkt KeyPact \u00a0 Hoe werkt KeyPact KeyPact is een platform voor gecontroleerde, end-to-end versleutelde communicatie en bestandsuitwisseling. Het bestaat uit vier onderdelen: KeyPact Mail, File Explorer, en integraties met Google Mail en Microsoft Outlook. KeyPact Mail KeyPact Mail maakt end-to-end versleutelde e-mail mogelijk tussen KeyPact-gebruikers. Deze communicatie verloopt volledig binnen de KeyPact-omgeving en gaat [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"slim_seo":{"title":"Hoe werkt KeyPact \u2013 Beveiligde Post-Quantum Data- & E-mailbescherming | KeyPact","description":"Ontdek hoe KeyPact werkt: end-to-end beveiliging met post-quantum cryptografie, forward secrecy en on-premise controle over databeveiliging voor e-mail, bestanden en communicatie."},"footnotes":""},"class_list":["post-740","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/keypact.com\/en\/wp-json\/wp\/v2\/pages\/740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/keypact.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/keypact.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/keypact.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/keypact.com\/en\/wp-json\/wp\/v2\/comments?post=740"}],"version-history":[{"count":5,"href":"https:\/\/keypact.com\/en\/wp-json\/wp\/v2\/pages\/740\/revisions"}],"predecessor-version":[{"id":1074,"href":"https:\/\/keypact.com\/en\/wp-json\/wp\/v2\/pages\/740\/revisions\/1074"}],"wp:attachment":[{"href":"https:\/\/keypact.com\/en\/wp-json\/wp\/v2\/media?parent=740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}