With the background provided so far, we can now discuss more details about the flow of control for accessing files when FESF is installed.
See Also:
Raw vs Encrypted/Decrypted Access to Newly Created Files
Raw vs Encrypted/Decrypted Access to Existing Encrypted Files