Discussion about this post

User's avatar
Deepak Puri's avatar

Me too. But it's always better to be cautious.

We're coming out with a version this week which can run offline without having to connect to the internet. That will let people use it offline and share the solution with others using Bluetooth which will help get it into more hands discreetly.

Expand full comment
Deepak Puri's avatar

"Any text protected by a keyword can be decrypted without the keyword, I believe." - Not easily without a lot of processing power. Read more:

"Strong Cryptography refers to the use of robust encryption techniques, such as AES or Triple DES, to protect sensitive data from unauthorized access. It involves storing data in a secure manner, either by hashing or symmetric encryption, to prevent data breaches and ensure data confidentiality." - https://www.sciencedirect.com/topics/computer-science/strong-cryptography

The attacker must go through the time-consuming exercise of cracking password hashes to obtain the actual credentials. Another clear benefit to hashing is that it eliminates the key management issues associated with encryption. To stay consistent with security best practices, ensure that the hashing algorithm of choice has not been determined mathematically susceptible to collisions, such as MD5 and SHA-1. Consult resources such as NIST (http://csrc.nist.gov/groups/ST/hash/policy.html) to find out the current set of hashing algorithms deemed acceptable for use by federal agencies.

Expand full comment
6 more comments...

No posts