Archive: 2014-09-07
Encrypted application configuration
If you want to automate a process that requires a lot of sensitive information—passwords, a PIN, the second, πth and eleventy-first letters of your so-called ‘memorable word’, and so on—then you probably don’t want to type all of them in separately every time. On the other hand, you probably also don’t want them to be stored in plain text on your computer, even if you’re using full-disk encryption.