mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-07-24 15:15:29 -04:00
reformat unnecessary lists
This commit is contained in:
parent
8ae907510f
commit
745de9bf7d
5 changed files with 54 additions and 42 deletions
|
@ -276,7 +276,7 @@ Password strength is measured in "[bits of entropy](https://en.wikipedia.org/wik
|
|||
|
||||
>What is a diceware passphrase? As [Privacy Guides notes](https://www.privacyguides.org/en/basics/passwords-overview/#diceware-passphrases), "Diceware passphrases are a great option when you need to memorize or manually input your credentials, such as for your password manager's master password or your device's encryption password. An example of a diceware passphrase is `viewable fastness reluctant squishy seventeen shown pencil`." The Password Generator feature in KeePassXC can generate diceware passphrases and random passwords. If you prefer to generate diceware passphrases using real dice, see [Privacy Guides](https://www.privacyguides.org/en/basics/passwords-overview/#diceware-passphrases).
|
||||
|
||||
### General recommendations:
|
||||
### General recommendations
|
||||
|
||||
* Memorize diceware passphrases of 7-10 words for everything that you'll need to enter before you have access to an unlocked KeePassXC database (in other words, your Full Disk Encryption passphrase and the KeePassXC master passphrase).
|
||||
* Generate passwords of 21 random characters for everything that can be stored in a KeePassXC database. Maintain an off-site backup of your KeePassXC database(s) in case it is ever corrupted or seized.
|
||||
|
@ -285,7 +285,7 @@ Password strength is measured in "[bits of entropy](https://en.wikipedia.org/wik
|
|||
>
|
||||
> Your memorized diceware passphrases can be easy to forget if you have several to keep track of, especially if you use any of them infrequently. To reduce the risk of forgetting a diceware passphrase permanently, you can use Tails to store all "memorized" passphrases on a LUKS USB then store it off-site where it won't be recovered during a police raid. You should be able to reconstruct the LUKS passphrase of this USB if a lot of time has passed. See the [Threat Library](https://www.notrace.how/threat-library/mitigations/digital-best-practices.html#header-use-strong-passwords) for two different approaches you can take: one relies on a trusted comrade, and the other is self-sufficient. As with all important backups, you should have at least two.
|
||||
|
||||
### Tails passphrases:
|
||||
### Tails passphrases
|
||||
|
||||
For Tails, you need to memorize two passphrases:
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue