TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

You can now make horcruxes out of your confidential files

29 pointsby jesseduffieldover 5 years ago

8 comments

red0pointover 5 years ago
This is unsafe and should not be used.<p>This is simply splitting the key in multiple pieces, thus for every piece you have, you gain additional information about the key, allowing for exponentially easier brute-forcing of the remaining key.<p>Example: Assume someone creates 3 horcruxes and you can get your hands on 2 of them. This gives you 85 bits of the full 128 bit key, thus you only need to brute force 43 bits for the rest. Of course you don&#x27;t have the full data anyways, but you still learn about 2&#x2F;3 of it.<p>A better tool is ssss which uses Shamir&#x27;s Secret Sharing. <a href="http:&#x2F;&#x2F;point-at-infinity.org&#x2F;ssss&#x2F;" rel="nofollow">http:&#x2F;&#x2F;point-at-infinity.org&#x2F;ssss&#x2F;</a>
评论 #21942474 未加载
private_vaultover 5 years ago
Instead of splitting the key into substrings or using Reed-Solomon codes I’d recommend something like Adi Shamir’s secret sharing scheme.<p>Using something like that allows you to say “split into seven shards but only require three to reconstitute”, and possessing less than the minimum number of shards yields no new information.
评论 #21940141 未加载
Stammonover 5 years ago
Wouldn&#x27;t the concept of dragonballs be a better fit than horcruxes?
评论 #21940979 未加载
jesseduffieldover 5 years ago
Hello all! Based on the feedback I&#x27;ve received in the last day I&#x27;ve made some improvements:<p>I&#x27;m now making use of Samir&#x27;s Secret Sharing Scheme meaning you can now specify a threshold of horcruxes required to resurrect the original file (hopefully putting me in better standing among the HP crowd)<p>If your threshold equals the total number of horcruxes, I&#x27;ll divide the content evenly between each horcrux to reduce file size. Otherwise each horcrux will contain the same encrypted content<p>As I&#x27;ve mentioned in another comment I no longer load files into memory so the program runs pretty fast<p>Thanks for the valuable feedback everyone!
GauntletWizardover 5 years ago
This is a great idea, though I don&#x27;t think it will be useful practically until it includes reed-solomon encoding support for both files and keys, so that you can lose a portion of your data and still be safe.
评论 #21936264 未加载
sidpatilover 5 years ago
Similar idea with (very) similar name: <a href="https:&#x2F;&#x2F;github.com&#x2F;kndyry&#x2F;horcrux" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;kndyry&#x2F;horcrux</a>
STEMdudeover 5 years ago
reminds me of <a href="http:&#x2F;&#x2F;www.hjsplit.org&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.hjsplit.org&#x2F;</a>
rolltiideover 5 years ago
that&#x27;s not a real word, keep using it if you would like it to be
评论 #21936537 未加载
评论 #21937518 未加载