Загрузка страницы

securely backing up gpg private keys.. to the cloud‽

Joey Hess
http://linux.conf.au/schedule/presentation/152/
Imagine a world in which gpg was not hard to use, and was used widely. Users exchange encrypted email, gpg sign comments on websites, make encrypted backups, and so on.

What happens, in that world, when a user's gpg private key gets deleted? The only backup is encrypted with the lost private key. Catch 22.

We're not in that world, and so we don't often worry about this problem. Unless we've lost gpg key ourselves. But solving the gpg key backup problem seems a necessary step in the path toward that world.

Most ways to back up gpg private keys require physical security, like a safe to keep the key in, and often cumbersome backup and restore procedures.

Keysafe makes backup and restore easy, by backing the private key up to the cloud. It necessarily trades off some security to do so, but manages to make it very expensive to compromise its backups. I'll explain how Argon2, Shamir Secret Sharing, relatively weak passwords, and AES decryption puzzles are combined in keysafe to accomplish this.

Видео securely backing up gpg private keys.. to the cloud‽ канала linux conf au 2017 - Hobart, Australia
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
19 января 2017 г. 17:45:28
00:30:35
Яндекс.Метрика