diff options
author | Joey Hess <joeyh@joeyh.name> | 2016-08-11 23:50:56 -0400 |
---|---|---|
committer | Joey Hess <joeyh@joeyh.name> | 2016-08-11 23:50:56 -0400 |
commit | 785a4c17686b2248a4c27e61564604a3999e9c22 (patch) | |
tree | 963b02a2afdff03f654adb22dd4a83c0c318e621 /keysafe.hs | |
parent | 863393ab2c656759e1c225537f692961d70041dc (diff) | |
download | keysafe-785a4c17686b2248a4c27e61564604a3999e9c22.tar.gz |
disable decryption puzzle, at least for now
It only adds 1 minute GPU time to each crack attempt, on top of the 10
minutes CPU time needed to argon2 the password. Since my implementation of
the AES puzzle is currently really slow, this is not worth it.
Will revisit when I have a faster AES library to use, or a better puzzle.
Diffstat (limited to 'keysafe.hs')
-rw-r--r-- | keysafe.hs | 2 |
1 files changed, 2 insertions, 0 deletions
@@ -57,6 +57,8 @@ retrievedemo = do hFlush stdout case decrypt kek esk of -- TODO: verify checksum to avoid false positives + -- (It's working without it only because the + -- decryption puzzle is currently disabled.) Just (SecretKey sk) -> print sk Nothing -> go esk rest |