Home      Download      Learn more      Tech      Help     

After I download the source only file, what do I do?

Tiger Privacy 

We strongly encourage you to only download the sourceonly.tar.gz file if you're an expert. There's a fair amount of work involved beyond building the source to get a working system. Full source code is included in all versions of the installer, too.

Expand the archive file
Build from source
Uninstall Tiger Envelopes
Configure your system
Test Tiger Envelopes

Expand the archive file

  1. Expand the archive into its own folder. If you using Mac OS X, read these notes before expanding the archive. The archive file contains the envelopes-x.y folder tree, where x.y is the version number.
  2. We refer to the installation folder throughout the documentation. The installation folder for Tiger Envelopes is the full folder name where you installed the archive, including the folder envelopes-x.y (or envelopes, if you created a link under Linux or OSX).

Building from source code

  1. Get and install all the development tools that we use to build from source before you begin.
  2. If you're not using Jikes, edit build.xml to tell it which compiler you're using.
  3. Review the build.xml properties that are clearly labeled with warnings. Adapt them to fit your environment.
  4. At a command prompt make the Tiger folder your current folder and type


Some software only compiles under Java 1.5 or later, so we don't generally delete those classes unless 1.5 is available to rebuild them. Use the ant clean.allclasses target to delete all classes on pre-1.5 systems.

Uninstall Tiger Envelopes

If you don't have Tiger Envelopes installed skip this section and configure your system.

You don't have to uninstall Tiger Envelopes. This installation process will use your existing configuration. But if you want to uninstall:

Configure Your System

  1. If you are going to use BC or GPG as the encryption package, then the Tiger Envelopes control panel lets you add and delete keys. It automatically signs the keys, too, so you're ready to use them.

    If you only have PGP installed on your system, then you must have a signed key for each email address you are going to use with Tiger Envelopes. Use PGP to create the ones you don't have.

    Of course, you'll need the passphrases for any existing keys you want to use. The control panel can create passphrases for you for new keys.

  2. After you compile the source for Tiger Envelopes, move to your Tiger Envelopes folder, and type

    ant control.panel

    You must add at least one account on the Email Accounts panel. Follow the instructions in Tiger's control panel to add accounts.

  3. Exit from the Tiger control panel after you've added your email accounts. Tiger Envelopes will not set up your mail client until you exit.

  4. If you're using a mail client that Tiger's control panel doesn't know, then you'll have to configure your mail client manually.

  5. You may want to set up a menu or script that starts the Tiger control panel. The control panel is a java app. Use the information from CommandLine Args in the General section of options.xml to set up your script or batch file that starts the control panel, except change the last Arg from com.tigerprivacy.envelopes.Main to com.tigerprivacy.envelopes.control.Main.

  6. Restart Tiger's control panel with ant control.panel. Click the Start button on the Status tab if it's not running.

  7. You should configure your system to automatically start the Tiger Envelopes server whenever you login. Otherwise, you won't be able to exchange any mail (private or plain) from the accounts you configured to use Tiger Envelopes until you start Envelopes manually.

    Tiger's server is a java app. Use the information from CommandLine Args in the General section of options.xml to set up your script or batch file which auto-starts Tiger Envelopes.

  8. When you exchange mail with someone using Tiger Envelopes, it automatically exchanges public keys for you. The first unencrypted message is the last. You can also import public keys in the control panel on the Keys tab.

Test Tiger Envelopes

  1. If you are using BC or GPG, then you can skip this step because Tiger handles it for you. If you're using PGP, create a new key for each of the following users:

    Name Email address Password
    Test User <test@tigerprivacy.local> 256AVAudio
    Test User2 <test2@tigerprivacy.local> MemoryF4800000

    It is very important that you enter the details above precisely as shown. For example, there is a space between Test and User, but there is no space between User and 2. There are no spaces in the passphrases.

    You add a new user to PGP with the command: pgp -ke.

    You must sign each key.

  2. Now you should be ready to test Tiger Envelopes.

OSX notes

When you expand the tiger archive on OS X, use double click on the file name from a Spotlight or Finder window. Do not use the command line sequence "gzip -d <directory> ; tar xvf". It is buggy when used with deeply nested directory structures.

Go back to the Support FAQ

Support Individual Rights Privacy policy
Copyright © 2005-2007 Tiger Privacy