TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Secure PGP Sync

28 pointsby thefreemanabout 10 years ago

3 comments

scosmanabout 10 years ago
Strangely, I was thinking about this problem this morning. A &quot;keychain code&quot; (aka, randomly generated passphrase) doesn&#x27;t seem any more usable. It moves from &quot;it&#x27;s hard to securely sync private keys across devices&quot;, to &quot;it&#x27;s hard to securely sync long passphrases between devices&quot;.<p>Why not a user chosen passphrase, with pretty extreme key stretching (w seed)? Allow fetching the encrypted key with any piece of ID similar (email, twitter handle). The key stretching makes brute-force or dictionary attacks pretty much impossible.<p><a href="http://en.wikipedia.org/wiki/Key_stretching" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Key_stretching</a>
评论 #9124557 未加载
upperechelonabout 10 years ago
Sooo what happens when whiteout gets an NSL and suddenly the &quot;we don&#x27;t store the keycode on our server.... trust us&quot; mantra gets thrown out the window? Why invent your own authentication protocol with AES-256-GCM when this seems like a clear-cut case for TLS? Why use PBKDF2 over Scrypt?
评论 #9129336 未加载
zokierabout 10 years ago
I don&#x27;t see how this is any significant improvement over just having passphrase protected private key in your dropbox. In both cases some cloud server has similar access to encrypted keyfile.
评论 #9124561 未加载