diff options
author | Joey Hess <joeyh@joeyh.name> | 2016-08-20 01:07:00 -0400 |
---|---|---|
committer | Joey Hess <joeyh@joeyh.name> | 2016-08-20 01:07:00 -0400 |
commit | e6097d694ca24b9546f9b7b25fc73768af9f017b (patch) | |
tree | 461cae393aae382f9f7a6a791e52bdd893da1b82 | |
parent | 25813fe287383e617339a66eb5657a08e94b51bc (diff) | |
download | keysafe-e6097d694ca24b9546f9b7b25fc73768af9f017b.tar.gz |
update todo
-rw-r--r-- | TODO | 18 |
1 files changed, 14 insertions, 4 deletions
@@ -1,11 +1,21 @@ * test suite (eg, test basic storage and restore of various size data) * tune hashes on more powerful hardware than thermal throttling laptop -* store to servers -* Run --uploadqueued periodically (systemd timer?) * improve restore progress bar points (update after every hash try) +* If we retrieved enough shares successfully, but decrypt failed, must + be a wrong password, so prompt for re-entry and retry with those shares. +* servers +* --no-jargon which makes the UI avoid terms like "secret key" and "crack + password". Do usability testing! +* --key-value=$N which eliminates the question about password value, + and rejects passwords that would cost less than $N to crack at current + rates. This should add a combo box to the password entry form in the + GUI to let the user adjust the $N there. +* --name and --othername to allow specifying those at the command line, + bypassing the prompts. With these and --key-value, keysafe would only + prompt for the password. +* .desktop file +* Run --uploadqueued periodically (systemd timer?) * Keep secret keys in locked memory until they're encrypted. (Raaz makes this possible to do.) Would be nice, but not super-important, since gpg secret keys are passphrase protected anyway.. -* If we retrieved enough shares successfully, but decrypt failed, must - be a wrong password, so prompt for re-entry and retry with those shares. |