![]() The password database is encrypted using a key derived from a strong master password.Įven if somebody acquires the encrypted password database through the cloud account, a strong enough master password renders brute-force attacks infeasible. Well - as mentioned above I use the KeePass-cloud combination. we can do this in KeePass under File > Database settings > Security: Personally, I use around 10,000,000 rounds (2 s delay). ![]() we can increase the resiliency of the KeePass database to brute force by increasing the number of PBKDF2 iterations.on the other handside - a masterpassword still can't compete with an actual long encryption key.regarding the master password: master password provides pretty good security as long as i choose a difficult to brute force password (long.Options can I secure it even further, by adding another layer of security by encrypting the file i am going to store in cloud storage.what if my cloud storage account is getting compromised then having the credentials recovered by either brute force or some other attack vector.there may be more and other risks - which one do you take into consideration"?.is it preferable that the DB file not get in the wild,. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |