3 Commands ********** This chapter introduces various commands for typical use cases.
· Key management · Cryptographic operations on regions · Cryptographic operations on files · Dired integration · Mail-mode integration · Encrypting/decrypting gpg files