I made an app that lets you split a file into horcruxes

栏目: IT技术 · 发布时间: 4年前

内容简介:GUI for Horcrux, made withSplit your file into encrypted horcruxes so that you don't need to remember a passcode

Horcrux

GUI for Horcrux, made with fyne.io (for the command-line version, see here )

I made an app that lets you split a file into horcruxes I made an app that lets you split a file into horcruxes

horcrux

Split your file into encrypted horcruxes so that you don't need to remember a passcode

I made an app that lets you split a file into horcruxes

How it works

Horcrux has two main functions: creating horcruxes and combining horcruxes

Creating horcruxes

If I have a file called diary.txt in my current directory I can select that and split it into horcruxes, creating files like so:

diary_1_of_5.horcrux
diary_2_of_5.horcrux
...

Now you just need to disperse the horcruxes around the house on various USBs or online locations and hope you can recall where they all are! Or send them to a friend across multiple channels so there's no risk of interception.

Combining horcruxes

On the receiving end, you can then recombine the hocruxes back together to obtain the original file.

Installation

via binary release

Who this is for:

  • People who need to encrypt a big sensitive file like a diary and don't expect to remember any passwords years from now (but who paradoxically will be capable of remembering where they've hidden their horcruxes)
  • People who want to transmit files across multiple channels to substantially reduce the ability for an attacker to intercept
  • People named Tom Riddle

FAQ

Q) This isn't really in line with how horcruxes work in the harry potter universe!

A) It's pretty close! You can't allow any one horcrux to be used to resurrect the original file (and why would you that would be useless) but you can allow two horcruxes to do it (so only off by one). Checkmate HP fans.

Q) How does this work?

A) This uses the (Shamir Secret Sharing Scheme)[ https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing ] to break an encryption key into parts that can be recombined to create the original key, but only requiring a certain threshold to do so. I've adapted Hashicorp's implementation from their (vault repo)[ https://github.com/hashicorp/vault ]

Alternatives (for command-line)


以上就是本文的全部内容,希望本文的内容对大家的学习或者工作能带来一定的帮助,也希望大家多多支持 码农网

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

Web容量规划的艺术

Web容量规划的艺术

阿尔斯帕瓦 / 叶飞、罗江华 / 机械工业出版社 / 2010-1 / 29.00元

《Web容量规划的艺术》由John Allspaw(F订ickr的工程运营经理)撰写,结合了他个人在F1ickr成长过程中的许多经历和很多其他产业中同行的洞察力。在衡量增长、预测趋势、成本效益等方面,他们的经验都会给你一些可靠并有效的指导。 网站的成功是以使用和增长来衡量的,而且网站类公司的成败(生死)是依赖于他们是否有能力来衡量决定他们的基础结构,从而适应不断增长的需求。作者通过自身实践给......一起来看看 《Web容量规划的艺术》 这本书的介绍吧!

HTML 编码/解码
HTML 编码/解码

HTML 编码/解码

MD5 加密
MD5 加密

MD5 加密工具

HSV CMYK 转换工具
HSV CMYK 转换工具

HSV CMYK互换工具