ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

Main Area and Open Discussion > Living Room

Legitimate app breaks popular encryption - EFS, BitLocker, TrueCrypt ...

<< < (6/7) > >>

ewemoa:
I am wary of programs that generate passwords / passphrases.

Tinman57:
I am wary of programs that generate passwords / passphrases.
-ewemoa (June 14, 2013, 09:07 PM)
--- End quote ---

  Don't know why, it just creates ascii words that you can copy and paste.  For instance, I'm going to create a password using Pins with the template Cv#9cUcvCl9v.  The result (set for 20 passwords) is Me!5rIcuZl9a, To_0cUvyKz7y, Ki)6bSruVk0u, Du)1dXsyXa4a, Xo(6xEjoMt2i, etc etc etc.  You can use whatever template you want and however many characters you want.  Nothing hidden, no buried codes, etc etc etc.  If Pins was some kind of malware program, they wouldn't have been on the market for all this time without someone raising the BS flag.....

ewemoa:
Thinking about the wariness, the following thoughts come up:

- Is the developer competent?
- Has the source been examined appropriately?
- Does the binary for the program behave as advertised with no malice and no serious errors?
- Not thrilled about auth information living in my clipboard
- Not thrilled about storing my auth info digitally -- this just hasn't worked out for me over the years
- Seems like a juicy target of a program for malicious code to modify
...

bit:
...

x16wda:
I wonder if this might be okay, or maybe have a backdoor.
-bit (June 29, 2013, 10:20 PM)
--- End quote ---

The NCH web site doesn't have a lot of info on what the program actually uses under the hood.  For individual files I'd rather stick with Axcrypt which is every bit as convenient and has the benefit of being free open source software.  (I haven't seen any peer reviews, but it doesn't show up in the National Vulnerability Database.

Now I just need to reread the original article to see how this relates...

Navigation

[0] Message Index

[#] Next page

[*] Previous page

Go to full version