Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision Both sides next revision
software:files [2022/12/22 22:26]
cyril [Digital Will]
software:files [2022/12/23 15:01]
cyril [Digital Will]
Line 27: Line 27:
     * Cons: there will be some delay between when you stop pinging and when your data becomes available, service needs to remain available, and if you host it yourself there is still a risk that your server crashes at the wrong time.     * Cons: there will be some delay between when you stop pinging and when your data becomes available, service needs to remain available, and if you host it yourself there is still a risk that your server crashes at the wrong time.
   - Split the secret between several people (cf [[https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing|Shamir's secret]], implemented for instance in [[http://point-at-infinity.org/ssss/|ssss]] or [[https://github.com/jcushman/libgfshare|libgfshare]]), so that X out of Y need to agree to obtain your data.   - Split the secret between several people (cf [[https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing|Shamir's secret]], implemented for instance in [[http://point-at-infinity.org/ssss/|ssss]] or [[https://github.com/jcushman/libgfshare|libgfshare]]), so that X out of Y need to agree to obtain your data.
-    * Cons: people need to remain accessible (and not loose the information), compromise between robustness and risk of conspiracy.+    * Cons: people need to remain accessible (and not loose the information), compromise between robustness and risk of conspiracy, what data can each person access
   - Store your key on a piece of opaque paper (eg visit card), with you (eg in your smartphone), wrapped in a unique piece of paper (eg journal paper) that is glued. The goal is that it is impossible to read the key (eg through light) without removing the wrapping paper, impossible to remove it without tearing it apart, impossible to replace it without you noticing quickly. The key has actually been encrypted with a large number of rounds, so that it takes several days to decrypt it with a classical computer, and only the designated persons possess the decrypting key. In case of unauthorized attempt, you can change the password.   - Store your key on a piece of opaque paper (eg visit card), with you (eg in your smartphone), wrapped in a unique piece of paper (eg journal paper) that is glued. The goal is that it is impossible to read the key (eg through light) without removing the wrapping paper, impossible to remove it without tearing it apart, impossible to replace it without you noticing quickly. The key has actually been encrypted with a large number of rounds, so that it takes several days to decrypt it with a classical computer, and only the designated persons possess the decrypting key. In case of unauthorized attempt, you can change the password.
     * Cons: need to actively monitor the integrity of your artifact, doesn't work if you have an accident that destroys the artifact, need to change the password in case of unauthorized attempt.     * Cons: need to actively monitor the integrity of your artifact, doesn't work if you have an accident that destroys the artifact, need to change the password in case of unauthorized attempt.
software/files.txt · Last modified: 2024/05/14 21:43 by cyril
CC Attribution-Share Alike 4.0 International
Driven by DokuWiki Recent changes RSS feed Valid CSS Valid XHTML 1.0