Services/Sync/WEP/115: Difference between revisions

Jump to navigation Jump to search
No edit summary
Line 121: Line 121:


= Staged Implementation =
= Staged Implementation =
I think that we have one chance to change the UX here, but we don't necessarily need to implement the back-end changes at the same time.
With the tools in place to manage a large chunk of entropy like the 256-bit key described here, we can hash that secret along with tags to create a password and secret phrase.
The user would still keep the 256-bit secret, but the client would use all of the existing encryption and authentication mechanisms until the new back end is available.


= Discussion =
= Discussion =
17

edits

Navigation menu