Backup of encrypted private key on uncontrolled disks
Dave English
dave at wiredthing.com
Thu Nov 20 18:33:52 CET 2014
Hint: do you always wear a hood over your head and the keyboard when entering your passphrase?
ATB
Dave English
> On 20 Nov 2014, at 16:54, Shea Levy <shea at shealevy.com> wrote:
>
> Hmm, I’m having a hard time imagining how someone could get me to divulge the passphrase if they couldn’t also get me to hand over the key backups I own. Of course, my imagination is not the limit here, so is there something I’m missing?
>
> Thanks,
> Shea
>
>> On Nov 20, 2014, at 11:27 AM, Robert J. Hansen <rjh at sixdemonbag.org> wrote:
>>
>>> My private key is encrypted with a very strong passphrase (10 word
>>> diceware [1], not written down, 129 bits of entropy). Given that, is it
>>> safe to back it up on disks I don't control, such as a private S3 bucket
>>> or a VPS? My intuition says yes, but I've learned to never trust my
>>> intuition when it comes to security.
>>
>> If you are completely confident that no one will ever get your passphrase from you, this is safe. Otherwise, it's not.
>>
>> It may be appropriate to have a little caution with respect to whether you believe anyone will ever get your passphrase from you.
>>
>> _______________________________________________
>> Gnupg-users mailing list
>> Gnupg-users at gnupg.org
>> http://lists.gnupg.org/mailman/listinfo/gnupg-users
>
>
> _______________________________________________
> Gnupg-users mailing list
> Gnupg-users at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnupg-users
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 495 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: </pipermail/attachments/20141120/a359511e/attachment.sig>
More information about the Gnupg-users
mailing list