17
edits
No edit summary |
|||
Line 121: | Line 121: | ||
= Staged Implementation = | = Staged Implementation = | ||
I think that we have one chance to change the UX here, but we don't necessarily need to implement the back-end changes at the same time. | |||
With the tools in place to manage a large chunk of entropy like the 256-bit key described here, we can hash that secret along with tags to create a password and secret phrase. | |||
The user would still keep the 256-bit secret, but the client would use all of the existing encryption and authentication mechanisms until the new back end is available. | |||
= Discussion = | = Discussion = |
edits