Comment by udev4096 10 months ago It's just not practical. How are you going to manually enter the password for let's say 10 servers? 3 comments udev4096 Reply johnisgood 10 months ago USB pendrive with random key, no need to enter anything and is more secure and gives you plausible deniability through many different means. cedilla 10 months ago Going around 10 servers with a USB drive sounds just as tedious, and what happens when you lose the key or the attacker gets it? johnisgood 10 months ago You generate a new one and replace it. Those what ifs apply to passwords as well.It might sound tedious for 10 servers, but passwords are even more so.For desktop, it is definitely the way.
johnisgood 10 months ago USB pendrive with random key, no need to enter anything and is more secure and gives you plausible deniability through many different means. cedilla 10 months ago Going around 10 servers with a USB drive sounds just as tedious, and what happens when you lose the key or the attacker gets it? johnisgood 10 months ago You generate a new one and replace it. Those what ifs apply to passwords as well.It might sound tedious for 10 servers, but passwords are even more so.For desktop, it is definitely the way.
cedilla 10 months ago Going around 10 servers with a USB drive sounds just as tedious, and what happens when you lose the key or the attacker gets it? johnisgood 10 months ago You generate a new one and replace it. Those what ifs apply to passwords as well.It might sound tedious for 10 servers, but passwords are even more so.For desktop, it is definitely the way.
johnisgood 10 months ago You generate a new one and replace it. Those what ifs apply to passwords as well.It might sound tedious for 10 servers, but passwords are even more so.For desktop, it is definitely the way.
USB pendrive with random key, no need to enter anything and is more secure and gives you plausible deniability through many different means.
Going around 10 servers with a USB drive sounds just as tedious, and what happens when you lose the key or the attacker gets it?
You generate a new one and replace it. Those what ifs apply to passwords as well.
It might sound tedious for 10 servers, but passwords are even more so.
For desktop, it is definitely the way.