The basics of Confidential Reader

In this first tutorial, we will use the ID common to all the Confidential Reader. We will discuss
the private ID keys in the next tutorial.
We will decrypt the data that was hidden in a tweet. The actions to perform will be identical if
it is an image posted on Facebook, a website, a blog, a mail server, or a free image hosting service.

The points covered in this tutorial:

  1. The decryption of an image containing hidden data.
  2. The data backup.
  3. The quick reopening of the image.
  4. Printing the data.


1. Decrypting hidden data

If the Confidential reader is in full screen, click the middle button at the top right of the
title bar, or use the shortcut [Alt + Space + R].
Click [Workspace] and [Always stay on top] so that Confidential Reader stays ahead.


Go to our Twitter page then drag an image in one of the demo tweets and drop it in
Confidential Reader.
Once the image is dropped, Confidential Reader performs the following actions:

  • Verification of the presence of hidden data.
  • Check the ID key (in this case it is the common key).
  • Decryption and display of hidden data.

2. Saving data

The image and its hidden data are stored in memory. To save them, you have 2 solutions:

•  Save the image and its hidden data: [Ctrl+S].
•  Save only what interests you: visible image [Ctrl+Alt+S],  hidden image [Ctrl+I],
hidden text [Ctrl+T].

3. Quick image reopening

You can also choose not to save anything and download the image whenever you need it.
To avoid repeating each time the steps we discussed above, you can use the shortcut that
was created when opening the image.
P.S. An image in a tweet remains downloadable even if the tweet is deleted.

4. Printing data

To access the print menu, click [File] then go to [print], and choose the item to print.


•  To avoid conflicts, in full-screen mode the [Always stay on top] option is
automatically disabled.
•  You can reconfigure shortcuts in the [Shortcuts] tab of the configuration panel.