Timeline for Using unique per-session gpg keys to store backups on cloud storage
Current License: CC BY-SA 4.0
4 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Mar 31, 2020 at 20:26 | comment | added | ThoriumBR | Don't choose a passphase, use a randomizer and create one. Using a symmetric key leaves the key vulnerable every time you encrypt anything. An asymmetric one only leaves the key vulnerable when you need to decrypt. | |
| Mar 31, 2020 at 16:53 | vote | accept | lonix | ||
| Mar 31, 2020 at 16:52 | comment | added | lonix | Thank you for your detailed explanation, it makes good sense. One thing I don't follow - I intended to use a passphrase (symmetric) for the master, but I think you are recommending a private/public keypair (asymmetric) for the master. I assume your way is better. But, if I choose e.g. 100-char passphrase (not pub/priv keys), is that not good enough? Or am I asking for trouble? | |
| Mar 31, 2020 at 15:24 | history | answered | ThoriumBR | CC BY-SA 4.0 |