Seth David Schoen <sch...@eff.org> wrote: >Two ways to address this that come to mind would be using >tamper-resistant hardware (which apparently Apple is doing >for crypto in iOS devices) to store or generate the >decryption keys using cryptographic secrets kept inside >the particular device itself, and finding some way for >the user to somehow input a much higher entropy unlock >password.
Yubikey combined with a short user password is a potential option for the second idea, with devices that have USB Host mode: https://guardianproject.info/2012/01/04/strong-mobile-passwords-with-yubikey-usb-token/ -- Too many emails? Unsubscribe, change to digest, or change password by emailing moderator at compa...@stanford.edu or changing your settings at https://mailman.stanford.edu/mailman/listinfo/liberationtech