When comparing Email an encrypted .EXE file (AxCrypt) vs Element (formerly Riot), the Slant community recommends Element (formerly Riot) for most people. In the question“What are the best ways to transmit sensitive information over the Internet?” Element (formerly Riot) is ranked 2nd while Email an encrypted .EXE file (AxCrypt) is ranked 13th. The most important reason people chose Element (formerly Riot) is:
You're not confined within Element's or even Matrix garden, and you don't have to make users of other networks switch to Matrix.
Specs
Ranked in these QuestionsQuestion Ranking
Pros
Pro Free and open source
AxCrypt is free and open source. This is beneficial because anyone can examine the source code and check for errors.
Pro No recipient software needed if emailed as .EXE.TXT
After selecting "Encrypt copy to .EXE," rename the file to ".EXE.TXT" in order to bypass email provider restrictions on sending .EXE files. Windows will then warn you that the file will become unusable but ignore it and continue to email the file. All the recipient needs to do upon arrival is rename the file back to .EXE and ignore the Windows warning message. Then simply open the self extracting file and type in the agreed upon password between the sender and recipient. This is a great advantage of AxCrypt because it does not force your recipient to download any software.
Pro Available at right click
AxCrypt is an extremely convenient encryption program because it is always available at a single right click.
Pro Password protected and optional key-file
AxCrypt encrypts each file with a passphrase and an optional key-file. Transferring a key-file (that AxCrypt can generate for you) on a separate medium and the password on another medium to your recipient is the most secure option. Although a strong password alone will do. The only caveat is that the password and key file must be transferred to your recipient and the most secure way to transfer it is physically.
Pro Once created, does not depend on other software
As long as you have the password or keyfile to your encrypted file then you can still access it. This is beneficial if the software ever becomes unsupported.
Pro Bridges to other networks
You're not confined within Element's or even Matrix garden, and you don't have to make users of other networks switch to Matrix.
Pro Markdown support
Code snippets in chats can be highlighted with Markdown.
Pro Simple interface
Element has a very simple interface, adding the ability for more inexperienced users to use it.
Pro VOIP and Videoconferencing
Pro Supports encryption
Element allows for fully encrypted text, voice, and video chatting.
Pro Widgets support
Want to watch that flick at YouTube and discuss it at the same time? Have Grafana graphs stacked above your DevOps team chat? Collaboratively edit Google Docs and chat over without switching applications? This is possible with Element.
Pro Decentralized
An open network for secure, decentralized communication.
Pro Self-hosting and federated network
Pro Libre/open source
Pro Search
Search messages in your current room, or all the rooms you're in. Not subject to a message history limit like Slack.
Pro Cross platform
Web browser
Linux
OS X
Windows
Android
iOS
Pro Large existing community
With public rooms for many people, and you can create your own and let people from the community join.
Pro Etherpad real-time document collaboration
An easy to activate integration that allows multiple authors to edit a document simultaneously.
Pro File Sharing
Pro Supports text, voice, video
Cons
Con Windows-only
The receiver has to be running Microsoft Windows (or a binary compatible system, like Wine).
Con Opening an .EXE file may worry some recipients
Some recipients will be cautious of opening an .EXE and may end up ignoring it. It is a good idea to inform them in advance that you will be sending an .EXE and it is safe. Another precaution is to sign the email so the recipient knows that is you.
Con Anti-virus will likely block it
Most anti-virus block or strongly warn again executable in emails. You'll likely have to rename the file and so will the end user.
Con Untrusted / not signed
Unless it's signed (i.e., you can somehow validate the signature of the attached EXE file via another method) the EXE may actually be compromized (e.g., man in the middle) and do anything on your machine as your run it.
Con AES-128 encryption
AES-128 encryption is still extremely secure but it is a lower and more outdated level of protection than what other encryption programs such as 7-Zip offer.
