Thanks for the reply Peter,

I should say it this way maybe:) Presently there is no way to enter a huge password other then memorizing or having it written down. There should be a way to enter a password key-file to open tails too. Having a hidden file to open the drive is an extra security step that only the end-user would know is there.

Another bigger issue that should be considered is: Implementing a failsafe mechanism that wipes the persistent drive if a number of failed attempts are made.

I really think that type of protection is needed. Say after 5 failed attempts it locks a user for an hour and after 8 failed attempts it wipes the drive totally.

Thank you for reading Peter,

Anthony

On 2016-02-29 08:05, Peter N. Glaskowsky wrote:
On Feb 28, 2016, at 11:31 PM, [email protected] wrote:
...
The first “C.L.P.P.S” password should be one the End-user has memorized. From there they can either open the tails persistent volume or they can open a second C.L.P.P.S Database. From there the password that opens the persistent volume should be in upwards of ten to twenty thousand characters.

If a short password is used to unlock a keychain that contains a
longer password,

A) the net security of the system is still constrained by the entropy
in the short password, and

B) there is absolutely ZERO benefit to storing a long password in text
form that will immediately be hashed down to a binary key for a bulk
cipher. Just store the binary key.

Best regards,

.                  png
_______________________________________________
Tails-dev mailing list
[email protected]
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to