The other big lesson here is that using a weak PIN to protect a strong key is difficult at best.
@mattblaze @stribika Then attackers can't brute force the weak PIN, but asshole "friends" can't erase your device either.
-
-
@RichFelker@stribika Yes, I like that model. -
@mattblaze@stribika The only problem is that you have to remember a passphrase that you very-rarely use. -
Tweet unavailable
-
@stribika@mattblaze How do you implement a secure delay that can't be bypassed? Without early wipe, attacker has incentive to experiment. -
Tweet unavailable
-
@stribika@mattblaze Yes, clock seems like an external input that could be forged.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.