On 7/7/15 6:21 PM, Tankred Hase wrote:
> Hi,
> 
> Some more context here:
> 
> https://blog.whiteout.io/2015/07/06/standardizing-secure-pgp-private-key-sync/
> 
> Using a 24 char backup code works fine for Whiteout users. We tested this in 
> our UX labs and people had no problem writing it down or copy/pasting it into 
> their password manager. So I can't confirm your hypothesis.

Ok, but the previous statement assume that the only use-case for
server-side storage of pgp keys is with/by using password manager in
desktop browsers, that's a constraint that should be specified.

Use-cases without password manager and/or on mobile browsers that are
not integrated with password managers would then lead to a less secure
environment because end-users would not likely use a 24 char password.

> We discussed using key stretching mechanism other than S2K but Werner Koch 
> and others were strongly in favor of reusing existing ciphers and mechanism 
> already available in current OpenPGP implementations.
I understand the need to re-use existing encryption code/standard, also
already in WebCrypto specs, but we shall then define the
boundaries/constraint of use.

Maybe, it could make sense to define multiple schema for
password-hashing in order to address lower-entropy password typed by
end-users each time they use the software implementing this specs?

Fabio
_______________________________________________

http://openpgpjs.org
Subscribe/unsubscribe: http://list.openpgpjs.org

Reply via email to