On Dienstag, 7. Juli 2020 22:42:07 CEST Stefan Claas wrote:
> Let's say you travel a lot and do not want to risk that your secret key
> gets compromised due to border control etc.
>
> One simply uses the program passphrase2pgp, from GitHub[1] and when creating
> the key and the passphrase is neede
Regenerating your secret key like this is perhaps dangerous and easy to do
wrong, for example you will probably leak it in your shell's history. If an
attacker finds out this is your scheme, they can then start to brute force your
secret key without need any access to your data, which happened w
Philihp Busby wrote:
> Regenerating your secret key like this is perhaps dangerous and easy to do
> wrong, for example you will probably leak it in
> your shell's history. If an attacker finds out this is your scheme, they can
> then start to brute force your secret key
> without need any acces
Stefan Claas wrote:
> ... you should try this out in your terminal and look at the beginning
> of the output:
>
> $ echo 1fccaf3d | xxd -r -p | openssl dgst -sha256 -binary | openssl enc
> -base64
I thought about this technique a bit for easy to remember passwords, which
can be converted to str
Ángel wrote:
> On 2020-06-18 at 16:54 +0200, Stefan Claas wrote:
> > charlie derr wrote:
> >
> > > Is getting those first 5 characters into the output of this string
> > > really that amazing? Or am i missing something significant about what
> > > the rest of the seemingly random characters repr
On 2020-06-18 at 16:54 +0200, Stefan Claas wrote:
> charlie derr wrote:
>
> > Is getting those first 5 characters into the output of this string
> > really that amazing? Or am i missing something significant about what
> > the rest of the seemingly random characters represent?
>
> Well, it is jus
charlie derr wrote:
> Is getting those first 5 characters into the output of this string
> really that amazing? Or am i missing something significant about what
> the rest of the seemingly random characters represent?
Well, it is just for fun and maybe people find it cool. At least it is
a brute-
On 6/18/20 9:33 AM, Stefan Claas wrote:
> ... you should try this out in your terminal and look at the beginning
> of the output:
>
> $ echo 1fccaf3d | xxd -r -p | openssl dgst -sha256 -binary | openssl enc
> -base64
>
> :-)
>
> P.S. A friend of mine came up with a shell script to do this.
>
... you should try this out in your terminal and look at the beginning
of the output:
$ echo 1fccaf3d | xxd -r -p | openssl dgst -sha256 -binary | openssl enc
-base64
:-)
P.S. A friend of mine came up with a shell script to do this.
Regards
Stefan
--
my 'hidden' service gopherhole:
gopher://i