|
|
Log in / Subscribe / Register

Generating Cryptographic Keys, etc.

Generating Cryptographic Keys, etc.

Posted Mar 3, 2026 17:43 UTC (Tue) by eharris (guest, #144549)
Parent article: Garrett: To update blobs or not to update blobs

So...all my (our) encryption/decryption is done air-gapped, and all our keys start off around 20,000 bits long.
Of course the encrypted material goes via the usual channels (Signal, Telegram, WhatsApp etc)....but so what?
The plain text is ALWAYS offline.....and even if the keys get weakened by bad actors....they are still HUGE!
and RANDOM!

Suppose there are weakened keys......it's still MONTHS before the snoops get to break them! Too late!!

Did I mention multiple encryption? No worries...as they say in Australia!


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds