this post was submitted on 17 Jun 2023
113 points (100.0% liked)

Selfhosted

40645 readers
217 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

Saw this posted over here: https://sh.itjust.works/post/163355

sounds like a really fun concept that should be shared here too :D

top 17 comments
sorted by: hot top controversial new old
[–] [email protected] 27 points 2 years ago (1 children)

I've always liked this, it has pretty much everything you could want in a personal project: a catchy name and a whimsical idea that is just on the edge of being actually practical.

[–] [email protected] 12 points 2 years ago

Yeah, there is something oddly mesmerizing about projects that solve an "already-solved-in-a-more-efficient-way" problem in a weird way

[–] [email protected] 8 points 2 years ago

I really like the name

[–] [email protected] 6 points 2 years ago* (last edited 2 years ago) (2 children)

This basically just means the files themselves become the authentication.

I don't see a singe use-case, where you couldn't just use normal private-key encryption and just save the private key to a file somewhere else. And if you want to distribute it to multiple locations, so that you need all of them, then there are also encryption methods for that.

[–] [email protected] 12 points 2 years ago

if nothing else, you could make a pretty fun digital treasure hunt or geocaching thing with it

[–] Whooping_Seal 2 points 2 years ago

While there is no use case I do think it is quite an interesting project, although my opinion maybe clouded by the cool name given the encryption methodology.

[–] [email protected] 5 points 2 years ago* (last edited 2 years ago) (1 children)

I always thought this was such a cool concept when I was administrating a Hashicorp Vault server. I made 7 fragments for 7 keyholders, and required that 4 or 5 of them (can't remember) enter their fragments to unlock the Vault server.

[–] [email protected] 11 points 2 years ago (1 children)
[–] [email protected] 13 points 2 years ago

From the git repo;

Q) How does this work?
A) This uses the Shamir Secret Sharing Scheme to break an encryption key into parts that can be recombined to create the original key, but only requiring a certain threshold to do so. I've adapted Hashicorp's implementation from their vault repo

[–] [email protected] 4 points 2 years ago

This is cool! This could be a handy way to store important private keys like internal root CA keys in known locations that are distributed across an infrastructure. Oh man, maybe even in a vault file for secrets you don’t need often like break glass credentials and the like. Such a cool and unique idea!

[–] [email protected] 3 points 2 years ago* (last edited 2 years ago)

that's super cool, almost zero use case but if you have a super sensitive string (such as a bank or wallet code) I guess it's a good layer of offline security

[–] [email protected] 3 points 2 years ago

I love the way I would keep my stuff safe:

Now you just need to disperse the horcruxes around the house on various USBs or online locations and hope you can recall where they all are!

[–] [email protected] 2 points 2 years ago

There is actually one use case for it. I create a yearly backup that i distribute across my friends (mostly via CD-ROMs) which include all my files that i can't afford to lose, like encryption keys, keepass database, crypto wallets (everything that isn't encrypted data gets aes-encrypted via gpg and a 512-bit key which is stored in the keepass database). But if say a malicious actor gets access to it by social-engineering they could start brute-forcing the keepass-database (good luck though with my passphrase and 10-rounds of argon2 with 4-threads and 4gig vector size), by splitting it into fragments that vector would be closed.

[–] [email protected] 2 points 2 years ago

This is very cool.

[–] falling_deeper42 2 points 2 years ago

Incredibly cool, will def try this

[–] [email protected] 2 points 2 years ago

Cool project :D probably not a real use case, but funny enough to try it out !!!

[–] [email protected] 2 points 2 years ago

This is insane, I love it.

load more comments
view more: next ›