The Chief Product Officer at Yubico thinks "long passwords" offer little security. 2ee75ee4e4b359576257fc7d3bfc5ec75d358f10e17caf9e668e09cc032af36d That is the SHA256 of the 76-character passphrase to my master backups, plus '!'. Pwn me. I'm waiting.https://twitter.com/appenz/status/1238121735142031360 …
-
-
Replying to @marcan42
so you exposed your decryption key to a computer just to hash it and post a tweet! You are doing it wrong, you can encrypt backups using a public key and store the private key in a Yubikey ;)
1 reply 0 retweets 1 like -
Replying to @julianor
This is an offsite disaster recovery key, it's very deliberately a very long symmetric key so I do not need to rely on physical artifacts that I might lose to use it.
1 reply 0 retweets 3 likes -
-
Replying to @julianor
Paper is still a physical artifact. Like the HDD that passphrase unlocks. Where would I keep it? Next to the server? No point.
1 reply 0 retweets 1 like -
-
-
It's not 76 *completely random* characters (but with plenty of entropy). Though I could make an EC pair out of a hash, sure. Not much point though. It does not encrypt the backups directly, so the top level layer is mostly irrelevant.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.