Home      Download      Learn more      Tech      Help     
 
 

Developing secure software


Tiger Privacy 


Getting started
Open source
Sandbox
Shared memory
Secondary storage
Trojans

Passphrase storage and encryption
Use Java
How to be sure a client is on the same machine as the server


Getting started


Open source


Code must run well in a sandbox


Shared memory


Secondary storage


Trojans


Passphrase storage

If the decryption key is not on removable media, with an open source package an attacker knows exactly where on the system to get the key. Even with closed source it's usually not much challenge to find it, and closed source is less secure anyway. So encrypting passphrases with the key hidden somewhere on the disk would be just for show, to impress people who don't know how encryption works. We are very reluctant to do that.

An effective alternative is to put the master key on removable media, creating a hardware token. But requiring that the user keep track of a hardware token is definitely not "Making private email easy". It is an appropriate option for Business Envelopes.


Use Java


How to be sure a client is on the same machine as the server


Support Individual Rights Privacy policy
Copyright © 2005-2007 Tiger Privacy
SourceForge