diff options
author | Joey Hess <joeyh@joeyh.name> | 2016-08-29 19:14:36 -0400 |
---|---|---|
committer | Joey Hess <joeyh@joeyh.name> | 2016-08-29 19:14:36 -0400 |
commit | 125c49c73de4178ca6093ac526f769d6015dd6b3 (patch) | |
tree | 787814bb329b821837c6c1ef3b0ee83e33372fc1 /TODO | |
parent | 918a88ace5a06b80f5c84076123b061a10efa708 (diff) | |
download | keysafe-125c49c73de4178ca6093ac526f769d6015dd6b3.tar.gz |
update
Diffstat (limited to 'TODO')
-rw-r--r-- | TODO | 5 |
1 files changed, 3 insertions, 2 deletions
@@ -4,7 +4,8 @@ * If we retrieved enough shares successfully, but decrypt failed, must be a wrong password, so prompt for re-entry and retry with those shares. * client/server Proof Of Work -* use TOR +* Include an example tor hidden service config, and systemd service file + for the server. * Don't require --totalshares and --neededshares on restore when unusual values were used for backup. Instead, probe until enough shares are found to restore. @@ -22,4 +23,4 @@ * Keep secret keys in locked memory until they're encrypted. (Raaz makes this possible to do.) Would be nice, but not super-important, since gpg secret keys - are passphrase protected anyway.. + are passphrase protected anyway.. |