LWN: Comments on "DeadDrop and Strongbox" https://lwn.net/Articles/551085/ This is a special feed containing comments posted to the individual LWN article titled "DeadDrop and Strongbox". en-us Sun, 19 Oct 2025 06:43:25 +0000 Sun, 19 Oct 2025 06:43:25 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net DeadDrop and Strongbox https://lwn.net/Articles/554786/ https://lwn.net/Articles/554786/ mp <div class="FormattedComment"> It appears that what is actually stored is not simply SHA256 of the code name, but HMAC(local_secret, code_name).<br> </div> Mon, 17 Jun 2013 07:03:50 +0000 Password scheme https://lwn.net/Articles/553121/ https://lwn.net/Articles/553121/ robbe <div class="FormattedComment"> The diceware list contains too many obscure entries for my taste. YMMV.<br> <p> We can agree that /usr/share/dict/words is usually not the best candidate.<br> </div> Thu, 06 Jun 2013 13:07:44 +0000 Password scheme https://lwn.net/Articles/553090/ https://lwn.net/Articles/553090/ micka <div class="FormattedComment"> There are lists created specifically for this usage.<br> Just take the diceware list or one language spcific one.<br> </div> Thu, 06 Jun 2013 07:30:46 +0000 Password scheme https://lwn.net/Articles/552958/ https://lwn.net/Articles/552958/ robbe <div class="FormattedComment"> <font class="QuotedText">&gt; Selecting at random four words from the /usr/share/dict/words on my</font><br> <font class="QuotedText">&gt; box (which contains 99171 entries) gives you more than 64 bits of</font><br> <font class="QuotedText">&gt; entropy.</font><br> <font class="QuotedText">&gt; [...]</font><br> <font class="QuotedText">&gt; I'm not aware of any system that allows me to remember that many</font><br> <font class="QuotedText">&gt; bits of entropy so easily.</font><br> <p> Assuming we have the same words file (the number of entries match), this contains a lot of hard-to-remember variants. For example every name occurs in there as "Jack" and as "Jack's". It is definitely not the list of simple words used by XKCD 936 (dictonary size 2^11 == 2048).<br> <p> For the sake of discussion, a script of mine generated this alternatives from the same 64 bits of randomness:<br> <p> adzes rights Macumba's staleness's<br> AU's mastoscirrhus seel Bremerton's<br> Abgangszeugnisse Sollstärke blumigen Synthetik<br> 17244702336126568816<br> gyskcgtcjfpsbg<br> cpprKpTOYLaG<br> uH25bi602OO<br> dLl%M4Aw.ZI<br> ?bwto5p5Zs<br> y°USK8Tüöq<br> g-ßa+j6ög3bv<br> <p> Decide for yourself if you're better at remembering the spelling of "mastoscirrhus" or "adzes" (or was it "adzes's") or a shorter random jumble of characters.<br> <p> [an hour later]<br> I added another wordlist based on Ogden's Basic English containing a bit over 2000 words. Example output:<br> <p> disgust saucer cool library overall moral<br> <p> </div> Wed, 05 Jun 2013 15:44:13 +0000 DeadDrop and Strongbox https://lwn.net/Articles/552389/ https://lwn.net/Articles/552389/ sourcejedi <div class="FormattedComment"> "The SHA256 hash of the code name is stored on the server"<br> <p> Why is this design considered appropriate for a secure system? <br> <p> Storing un-iterated, unsalted password hashes makes it easier to compromise large numbers of passwords once you've gained access. Every time someone gains access to a system with this design, we read articles criticising it...<br> </div> Fri, 31 May 2013 08:01:05 +0000 Timely! https://lwn.net/Articles/551863/ https://lwn.net/Articles/551863/ fandingo <div class="FormattedComment"> s/New York Times/Associated Press/<br> </div> Sat, 25 May 2013 21:18:54 +0000 Password scheme https://lwn.net/Articles/551817/ https://lwn.net/Articles/551817/ diederich <div class="FormattedComment"> Selecting at random four words from the /usr/share/dict/words on my box (which contains 99171 entries) gives you more than 64 bits of entropy. At one billion tries per second, it will take up to 584 years to find the right combo.<br> <p> You did say 'reduce'; most people select passwords that have less entropy, and are possibly not as easy to remember.<br> <p> I'm not aware of any system that allows me to remember that many bits of entropy so easily.<br> <p> </div> Fri, 24 May 2013 21:54:47 +0000 DeadDrop and Strongbox https://lwn.net/Articles/551753/ https://lwn.net/Articles/551753/ ras <div class="FormattedComment"> So this will be the legacy of Julian Assange. To show the world how it could be done, but perhaps not how not it should be run.<br> <p> That is enough I think. Well done Julian.<br> </div> Fri, 24 May 2013 10:41:34 +0000 Timely! https://lwn.net/Articles/551684/ https://lwn.net/Articles/551684/ dlang <div class="FormattedComment"> This wasn't just one Journalist, this was a very large portion (if not the entire staff) of the New York Times, and not just for a short time but for several months.<br> </div> Thu, 23 May 2013 20:20:17 +0000 Password scheme https://lwn.net/Articles/551668/ https://lwn.net/Articles/551668/ njwhite <div class="FormattedComment"> Passphrases are always supposed to be like that, I think. The 'diceware' method is a popular way to generate them.<br> <p> So these sorts of passwords have been around for ages.<br> <p> Though presumably if you know you're targeting say 4 dictionary words, you can reduce the time to crack enormously (with a general offline dictionary attack, not relevant to dead drop's system.)<br> </div> Thu, 23 May 2013 16:55:06 +0000 Password scheme https://lwn.net/Articles/551663/ https://lwn.net/Articles/551663/ aaron The source's password scheme is the one described in <a href="http://xkcd.com/936/">this XKCD comic</a>. <p>Did Randall Munroe originate that, or what? Thu, 23 May 2013 16:06:31 +0000 Timely! https://lwn.net/Articles/551599/ https://lwn.net/Articles/551599/ micka <div class="FormattedComment"> Ah I see. We (in France) had similar events. One journalist's phone bill was studied by an "intelligence" agency to find its source (who happened to be from the ministry of justice) in a political affair ( <a href="http://en.wikipedia.org/wiki/Bettencourt_affair">http://en.wikipedia.org/wiki/Bettencourt_affair</a> ). Then that was the judge's phone bill...<br> </div> Thu, 23 May 2013 12:16:32 +0000 Timely! https://lwn.net/Articles/551597/ https://lwn.net/Articles/551597/ sorpigal <div class="FormattedComment"> In the USA it was recently (within the last ~2 weeks or so) reported that the government had been monitoring the business and personal phones of some large number of employees (read: journalists) of a respected news organization. The upshot of this is that if any of these people over a rather long time frame (months, I believe) had called or been called by a confidential source the content of their conversation was recorded.<br> <p> If I seem vague on details it's because I haven't really followed the story, but I had the same reaction: DeadDrop comes at *just* the right time. Barnum could not have picked a better moment to unveil a mechanism to allow safe communication between journalists and sources that makes a plausible promise to be free of government surveillance. <br> </div> Thu, 23 May 2013 11:57:52 +0000 Timely! https://lwn.net/Articles/551572/ https://lwn.net/Articles/551572/ micka <div class="FormattedComment"> Thank you, that was useful, now I understand.<br> </div> Thu, 23 May 2013 09:05:53 +0000 Timely! https://lwn.net/Articles/551564/ https://lwn.net/Articles/551564/ smitty_one_each <div class="FormattedComment"> <font class="QuotedText">&gt;Do you mind giving pointers ?</font><br> Probably not without a system like the one described in the article.<br> </div> Thu, 23 May 2013 08:46:04 +0000 Timely! https://lwn.net/Articles/551551/ https://lwn.net/Articles/551551/ micka <div class="FormattedComment"> You seem to talk about precise events that are occuring now.<br> I might not be be in the same part of the world than you (US ?) so I'm not aware of these possibly related events.Do you mind giving pointers ?<br> </div> Thu, 23 May 2013 07:04:49 +0000 Timely! https://lwn.net/Articles/551526/ https://lwn.net/Articles/551526/ jmorris42 <div class="FormattedComment"> Wondering how you guys could post this and fail to note how timely it is. Had it went live on schedule nobody would have noticed, but the delay just happened to cause it to hit the news at exactly the time when multiple assaults on media outfits trying to catch whistleblowers also hit the papers.<br> <p> We probably always needed something like this, but few would have actually used it. Especially back in the days of Bush, the Patriot Act and whining about the evil government coming after your library records... lots of talk but nobody actually believed it would happen. Well now it happened and lookie who it was that went and done invoked the Espionage more in four years than in the decades it was on the books before.<br> </div> Thu, 23 May 2013 02:24:28 +0000