Key safety vs Backup : History of a bad day (key-restoration problem)

Atom Smasher atom at smasher.org
Sun Oct 28 11:05:55 CET 2007


On Sun, 28 Oct 2007, Sven Radde wrote:

> Atom Smasher schrieb:
>
>> in theory, if you're *really* using a strong pass-phrase, you can 
>> publish your private key in a public place and rest secure in the 
>> knowledge that no known technology can break your 100+ character 
>> pass-phrase... and if a hard drive or several go up in smoke you can 
>> recover a copy from google's cache ;)
>
> A few thoughts on this: - You could use the very long passphrase, upload 
> to secret key to somewhere and then change the passphrase back to a 
> shorter one for daily use.
============

and then inevitably forget what you used for the *really* secure 100+ 
character pass-phrase, because you never use it.


> - Instead of doing this, you could just take your secring.gpg, encrypt 
> it using "gpg --symmetric" with a really long passphrase and publish the 
> result.
===============

see above.

but this has me thinking... why not combine the "hidden in plain sight" 
part with the encrypted part using steganography... use a reasonably 
strong passphrase ("reasonable" depends on the needs of the end user) for 
your secret key, then hide it in a JPG and post it in a public place. if 
you use `outguess` (i'm not sure about other tools) you can even require a 
pass-phrase to get the data in/out of the image file, not to mention that 
outguess provides a plausible deniability feature.

i know... to many people on this list steganography, like one time pads, 
is more of a toy than a real crypto solution, but compared to posting a 
secret key in a public (or even an insecure non-public) place i'd say it's 
"better than nothing".

even with a reasonably strong pass-phrase i wouldn't want to walk around 
with my secret key on a flash-drive with my physical keys, but hidden in a 
JPG of family/friends/pets it would be easily overlooked if i lost 
possession of the flash-drive. and if all of my drives picked the same day 
to die, i'd have a recoverable copy of the secret key.


-- 
         ...atom

  ________________________
  http://atom.smasher.org/
  762A 3B98 A3C3 96C9 C6B7 582A B88D 52E4 D9F5 7808
  -------------------------------------------------

 	"They have computers, and they may have
 	 other weapons of mass destruction."
 		-- Janet Reno, US Attorney General,
 		27 Feb 1998





More information about the Gnupg-users mailing list