|
2010-03-26
, 17:10
|
Posts: 125 |
Thanked: 77 times |
Joined on Oct 2009
@ Sao Paulo, Brazil
|
#82
|
|
2010-03-26
, 18:07
|
Posts: 6 |
Thanked: 0 times |
Joined on Mar 2010
|
#83
|
|
2010-03-26
, 18:20
|
Posts: 1,341 |
Thanked: 708 times |
Joined on Feb 2010
|
#84
|
|
2010-03-26
, 21:20
|
Posts: 125 |
Thanked: 77 times |
Joined on Oct 2009
@ Sao Paulo, Brazil
|
#85
|
Does pySafe use some widely supported password db system, or does it have its own?
|
2010-03-26
, 21:36
|
Posts: 292 |
Thanked: 131 times |
Joined on Dec 2009
|
#86
|
I like Password Safe because the database (file) is directly compatible with passord applications in Linux and Windows. So it is easy to sync from master password list to other devices just by using a copy.
|
2010-03-27
, 08:29
|
Posts: 1,341 |
Thanked: 708 times |
Joined on Feb 2010
|
#87
|
Are you sure? I thought Password Safe for maemo 5 used an older file format that was not compatible with current desktop versions.
|
2010-04-04
, 11:02
|
Posts: 39 |
Thanked: 0 times |
Joined on Feb 2010
@ Zürich, Switzerland
|
#88
|
|
2010-04-04
, 17:59
|
Posts: 125 |
Thanked: 77 times |
Joined on Oct 2009
@ Sao Paulo, Brazil
|
#89
|
Is there a way to synchronize passwordsafe files with some password-tool running on Ubuntu Linux?
|
2010-04-05
, 08:31
|
Posts: 138 |
Thanked: 103 times |
Joined on Jan 2010
@ Southern Germany
|
#90
|
Thanks for working on this application! I am sure that I will be able to use it for many years much to my satisfaction. However, I am writing to ask a fundamental security question before I begin to use it.
The obvious security flaw in such an application is that the user trusts the author not to have backdoor transmissions or access to the unencrypted data. I am a little uncomfortable putting all my most secret passwords into such a utility knowing this.
Although I searched on your garage entry and in this thread, I have seen no reference to the original source code. If I could compile the program (or, if it's python, just run it) from the original source, then I would have an opportunity to ensure there are no such backdoor shenanigans.
Please do not take this note as a personal slight--it's just the nature of wanting to store so much security information in one spot. To me, the best feature of any such program is that the source is available. Could you share, or tell me how I might otherwise look through it? That is, after all, the whole point of *nix, yes?
Cheers,
Bryce