SecExMail is engineered with a focus on transparency to give you the assurance that no backdoor keys or key recovery is embedded in encrypted messages. This means you as the recipient or sender of an encrypted SecExMail message can verify what keys have been used in the encryption of that message.
The non-technical approach to this is to right-click an encrypted message listed on the in-tray tab or out-tray tab with your mouse and select "decode" from the pop-up menu. Click the watch tab to review the analysis of the offline decryptor. The watch tab will report both whom the message was addressed to and whom the message was encrypted to. See sample output below :
Offline decryptor starting file analysis This email was sent to: firstname.lastname@example.org -> have key This message was encrypted to: email@example.com ...session key ok Decrypted in 0.24 seconds
If the message was encrypted to multiple recipients, the log output will indicate this. Note that you will only be able to decrypt messages for which you hold private keys. This means that if you send email to people on your friends list, only your friends will be able to decrypt these messages. See SecExMail Keys.
The more technical approach to verifying keys used in encryption of a particular messages is to use base64 decoding software and examine the raw data. See SecExMail Message Format for details.