Can Kleopatra be blocked?

I am very nervous about why Kleopatra has to be contacted every time I encrypt a file. Can someone please explain to me why this is necessary? Shall I run Wireshark to monitor Kleopatra or will the ssl be encrypted too?

Can someone guarantee that Kleopatra isn’t opening up my system as a security risk?

I would like to be assured that a hole is not being opened here.

Thanks for explaining some more about this?

And if I block Kleopatra with a firewall rule, will that basically render gnu4win useless?

  • Very concerned