Skaht
Skaht
Been investigating the this tech for over two years now. For #3, I'm certain that Yubikeys are applied to perform asymmetric decryption operations, not asymmetric encryption. The encryption is performed...
Here are a few pearls to drawl from for https://github.com/drduh/YubiKey-Guide#using-multiple-keys Section: One can can re-import their public keys/certs (master and subkeys) and perform a "gpg card-status" to transform/stub the certificate...
Thanks for the feedback. Here is my summary of the two approaches mentioned above. The diagram at [gnupg-card-architecture.pdf](https://github.com/romanz/trezor-agent/files/4062737/gnupg-card-architecture.pdf) provides a good context for the discussion of the two approaches mentioned...
Here is one more document that illustrates how extensive GPG's [**ASSUAN Protocol**](https://www.gnupg.org/documentation/manuals/assuan.pdf) is to support IPC communication between gpg modules. [gnupg-module-overview.pdf](https://github.com/romanz/trezor-agent/files/4062926/gnupg-module-overview.pdf) It appears that without gpg providing native USB HID...
> Having `app-openpgp-trezor.c` is one option. > > Another option is to have `app-openpgp-fido2.c` and create a universal FIDO2 integration the same way as it was implemented in OpenSSH. See...
@prusnak - Any possibility of an AppID and BIP-39 seed words & passphrase HMAC-SHA512 being used to create an ECC private/public key pair to replace **trusted device keys** and HMAC-SHA256...
Seconding the motion of Alex-Werner. At least half of the Dash masternodes need to be controlled to achieve a 51% attack against the Dash Network since **SPORK_19_CHAINLOCKS_ENABLED** was set to...
Updated calculation above to reflect the 60% quorum threshold required.
See Andreas video at https://www.youtube.com/watch?time_continue=675&v=qrwgYDAoZV0 for more about the Chainlock topic.
Given the time that has transpired, issue #44 appears to be an ignore "slow roll", can't push on rope - can only pull rope. The data for Dash shown at...