Hi, welcome to Hax0rbana where #security is number one priority!
Today I placed another $400+ order from Mouser to get components to build more #Signet devices. Hardware password managers for everyone who wants them!
I'm here to go beyond federation and go fully #decentralized.
Can application memory really be dumped on Windows without admin privs?
I ask because keepass is not intended to be secure when used on an untrusted computer.
On an untrusted computer, the attacker (who controls the O/S) can install a keylogger, see all clipboard activity, dump memory which if it doesn't contain the password, it will contain the key that is derived from the password.
If you want protection against a malicious computer, get a hardware password manger like #Signet
OK, time to get that laser focus. I've been taking too many side quests trying to get the APK to build, preparing for the macOS build, writing an "install" target for make, trying so many different tools to make a .deb package... (yes, all this is for #signet).
I've separated each of the changes out to separate branches now and I am getting back to cranking out the .deb package.
I want to get it working well on Debian-based distros first, then I can move on to the others.
Reviving an open source hardware security project (#Signet)
Supporting old 32-bit CPUs (w/o SSE4)
Automating mesh networking setup with ad-hoc hardware
Hosting a project to build open source thermostat software for a fellow hacker (#HestiaPi)
In short, giving people alternatives to big tech, doing my part to make sure older computers are still viable drivers, and helping people to be self sufficient on a shoestring budget.