When you first get this downloaded, you will need to open either Bob or Alice then the opposite before itworks, as it needs to generate the public keys.
Once this has been done it never needs to be done again.


This is an example of End to End Encryption, which a convosation can happen between 2 people without anyone else knowing the secret key.
You could also use encryption for personal reasons, such as making an offline password manager. However, this wouldn't work if you had spyware on your device.

The strength of this kind of cryptography is extremely strong and can take 100's or 1000's of years to crack.
It may also be impossible to crack in some cases, as eventually you may get a false positive and have a sentance that makes sense, but isn't what it means.
