New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
gocryptfs.conf in cloud #50
Comments
|
Yes. Let's do the math:
|
|
Also very good is this tables that uses hardware cost as the metric instead: http://security.stackexchange.com/a/95764 We use scrypt with 0.3 seconds instead of 3.8. Also the table is from 2002, so lets say hardware has gotten 100x times cheaper since then, and we arrive at 1000x. So read from the bottom row and divide by 1000. |
|
I guess what the OP wanted to ask is whether it's safer to keep the |
|
Yes, not uploading it is more secure. |
|
Thanks for the answers! So I will go for keeping the conf-files off-cloud. |
|
The next related question can be:
I think it will be a great evolution. |
|
Hi, you can put |
|
@rfjakob ok, thank you for the information about config file ability (could you develop or is it in the man page ?). Do you agree ? |
|
As per this comment, it is okay to backup |
As a follow-up to issue #37:
Is it safe to upload gocryptfs.conf into the cloud, if the password is strong enough?
If yes, how strong should the password be?
The text was updated successfully, but these errors were encountered: