From 60ecd8181e386d2fe75bbc87933fba9536487e9c Mon Sep 17 00:00:00 2001 From: Maarten Billemont Date: Fri, 18 Jul 2014 12:03:27 -0400 Subject: [PATCH 1/2] track outbound links. --- Site/2013-05/algorithm.html | 12 ++++++------ Site/2013-05/faq.html | 14 +++++++------- Site/2013-05/index.html | 13 +++++++------ Site/2013-05/privacy.html | 8 ++++---- Site/2013-05/security.html | 14 +++++++------- Site/2013-05/support.html | 12 ++++++------ Site/2013-05/trouble.html | 8 ++++---- 7 files changed, 41 insertions(+), 40 deletions(-) diff --git a/Site/2013-05/algorithm.html b/Site/2013-05/algorithm.html index 4a5a4307..c98d74b2 100644 --- a/Site/2013-05/algorithm.html +++ b/Site/2013-05/algorithm.html @@ -40,10 +40,10 @@
  • FAQ
  • Algorithm
  • Support
  • -
  • Source (GPL)
  • +
  • Source (GPL)
  • -
  • Template character: A (= V . C) +

  • Template character: A

  • -
  • Template character: a (= V . v . C . c) +

  • Template character: a

    @@ -296,9 +296,9 @@ passWord[i] = passChar
  • @&%?,=[]_:-+*$#!'^~;()/.
  • -
  • Template character: X (= a . n . o) +

  • Template character: X

  • diff --git a/Site/2013-05/css/main.css b/Site/2013-05/css/main.css index 624f2177..8cdb5b52 100644 --- a/Site/2013-05/css/main.css +++ b/Site/2013-05/css/main.css @@ -104,6 +104,13 @@ h2.inline, h3.inline, h4.inline { .box img { border: 1px solid white; } +img.block { + display: block; + border: 1px solid black; + padding: 4px; + margin: auto 1em; + width: 640px; +} .thumb { clear: both; diff --git a/Site/2013-05/faq.html b/Site/2013-05/faq.html index 48f67f87..8af26f74 100644 --- a/Site/2013-05/faq.html +++ b/Site/2013-05/faq.html @@ -94,9 +94,17 @@

    There is an exception: Master Password allows you to save "custom" or "personal" passwords in the app. These passwords don't use Master Password's special algorithm and are merely encrypted using the strong master key derived from your master password. These types of passwords behave more like conventional vault-based passwords do. They are however very well protected and an attacker would still need to find a way to crack your master password (which is extremely difficult, see below) before being able to decode the passwords in its vault.

    +

    Can an officer force me to divulge my master password?

    +

    Cryptography only provides technical security. It does not protect you from situations where you are legally required or forced by peers to surrender your key.

    + +

    In fact, many countries provide their officers with a legal grounds for forcing you to divulge your encryption keys to any encrypted information they've recovered during a warranted search.

    +

    Again, unlike ordinary password managers, Master Password might have an edge here. If you make no use of stored passwords, Master Password doesn't actually encrypt anything with your master password. That means, when your devices are seized, these legal grounds may no longer apply. Note however that this does not constitute legal advice and that this theory has never been tested in practice.

    +

    For your safety, we recommend that in preparation of travelling, you change the master password for your user on the device. That way, if your device is seized by a foreign entity and they force you to divulge your master password, you'll likely be fully compliant by simply giving up the new master password even though it will cause the app to generate invalid passwords for all your sites. Later, you can always change the master password back to the real one.

    +

    What should my master password be?

    The simple answer to that question is: First and foremost, memorable and unrelated to you. What that means is that the most important thing about your master password is that you need to be able to recall it any time and yet it should not be derived from anything personal.

    That advice usually doesn't help very much with actually picking a good master password. The goal of a good password is that it'll take an attacker a lot of guesses before he'll find it. That is the core idea behind good passwords.

    +

    There are a few strategies of getting good passwords. The speed with which an attacker can guess your password depends a lot on whether he knows what kind of password you're using or not. So we'll compare a few password strategies, their strength and how memorable they are.

    The simplest strategy for picking good passwords is by just picking a bunch of random letters, digits and symbols and mixing them up. This is a great strategy for strong passwords but those passwords are usually not very memorable.

    Another strategy is by "encoding" something you already know. This can seem like a good way to make memorable passwords, but recalling the "encoding" you used two years later can be tricky. This also makes it much easier for attackers that know you to find your password.