Timeline for Is the following a secure method for file encryption?
Current License: CC BY-SA 4.0
13 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jan 22, 2021 at 16:02 | history | bumped | CommunityBot | This question has answers that may be good or bad; the system has marked it active so that they can be reviewed. | |
| Dec 23, 2020 at 16:23 | comment | added | kelalaka | You should provide a link and reasons why the other solution is not working for you or complicated. | |
| Dec 23, 2020 at 15:49 | comment | added | JojoTheCodeDude | I am asking this question because i have seen several other similar situations where file encryption is involved, and it is said to generate several random keys, then using pbkdf2 to generate another key which is used to encrypt the random keys, then extra bytes from the pbkdf is written to the header of the file to make sure a correct password is supplied during decryption, my point is that it seems more complicated than what i have proposed in my question, but both come to the same result. | |
| Dec 23, 2020 at 15:01 | comment | added | schroeder♦ | "Is this a secure method?" -- secure against what? | |
| S Dec 23, 2020 at 14:06 | history | suggested | Harikrishnan | Added tag encryption | |
| Dec 23, 2020 at 12:33 | review | Suggested edits | |||
| S Dec 23, 2020 at 14:06 | |||||
| Dec 23, 2020 at 1:12 | comment | added | kelalaka | eff.org/keeping-your-site-alive/evaluating-your-threat-model | |
| Dec 23, 2020 at 1:09 | comment | added | JojoTheCodeDude | Would you mind elaborating on that question? | |
| Dec 23, 2020 at 1:01 | comment | added | kelalaka | What are your risks? | |
| Dec 22, 2020 at 2:02 | answer | added | mti2935 | timeline score: 0 | |
| Dec 22, 2020 at 0:28 | answer | added | Z.T. | timeline score: 1 | |
| Dec 21, 2020 at 23:48 | review | First posts | |||
| Dec 22, 2020 at 1:36 | |||||
| Dec 21, 2020 at 23:47 | history | asked | JojoTheCodeDude | CC BY-SA 4.0 |