-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 09/06/2010 12:21 PM, Arthur Avramiea wrote: > The pass doesn't have to be in plain text in the software ... I > can store it as sha1 or other kind of hash. Wouldn't that solve most of it? > Or some implementation of SSL.
You are confusing encryption algorithms with the keys. The decryption runs on the client and is using a key. A cracker can intercept that key. You can try and obfuscate things as much as you want, but it is still fairly trivial for a determined cracker to get it, assuming that is even the cheapest way of doing things. > The software will be ran only by the course instructor so it will not have a > big chance to get in the wrong hands. I want less exposure so that is why I > want to avoid a web interface for it. Another simple approach for a cracker is to bribe an instructor to hand over credentials and database content. Or install a USB keyboard sniffer they won't notice. If you have a web interface then the decryption and keys are all server side, so at least they remain private. That won't stop screen shots or similar approaches but at least you won't be handing over all the content at once. Anyone can design a security scheme they cannot crack themselves. That doesn't mean it can't be cracked or that it is even any good. Heck even so called experts have made mistakes - for example see SSLv1 and WEP. Roger -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAkyEs4cACgkQmOOfHg372QS2EQCghyZpJXD3h3diyrD2yCRULtMg TUYAoODS1Vk4ivT/5d7b6lsn7CCGJZYa =3uPA -----END PGP SIGNATURE----- _______________________________________________ sqlite-users mailing list [email protected] http://sqlite.org:8080/cgi-bin/mailman/listinfo/sqlite-users

