1

Topic: Safe operation with the private data

By all greetings, I Am played here with . The question what experts  for magnification of safety from theft of the data is interesting. Clearly, there is OS level for which the user answers. It is interesting that I as the developer of the Java can add programs. While all that I plan to add it the user the master should transfer the password through interactive waters at an application launch.  all private data which has been set at  I will store in https://github.com/jorabin/KeePassJava2. If the idea at initialization to generate still what  a unique casual key, to store it where  on a disk and to use as an additional key to a database. If in it sense since program source codes I plan to open? How to work in private keys in storage? To delete them when it is not necessary, it that  helps. On ideas, the master the key will be all time in storage while the program works.

2

Re: Safe operation with the private data

Hello, Tourist, you wrote: T> How to work in private keys in storage? To delete them when it is not necessary, it that  helps. On ideas, the master the key will be all time in storage while the program works. The data in storage needs to be ciphered. Generally? Look as managers of passwords, for example, KeePass are arranged.

3

Re: Safe operation with the private data

Hello, BlackEric, you wrote: BE> Hello, Tourist, you wrote: T>> How to work in private keys in storage? To delete them when it is not necessary, it that  helps. On ideas, the master the key will be all time in storage while the program works. BE> the data in storage needs to be ciphered. Generally? Look as managers of passwords, for example, KeePass are arranged. It is possible, but it is necessary where then all the same a key to keep in the memory. If to start with that that the attacking know program source codes simply complicates it the task only on one step. Though should help hearts which can simply analyze easier storage of different programs and to search for the data similar to private keys. Such it is possible?  it is ciphered, we decrypt when it is necessary to sign transaction and  again.

4

Re: Safe operation with the private data

Hello, Tourist, you wrote: T> Toest is ciphered, we decrypt when it is necessary to sign transaction and  again. Yes. Or we use hardware tokens in an active mode. There the data for the signature is transferred in a token and key pair being generated never abandons a token.