You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
PT (like Tombo, VimVry6, and AESZip) use a passphrase only (possibly with key derivation function) for encryption/decryption
Many tools (like Opengpg, age, etc.) Use a key file (typically on disk, but not always) that is protected by a passphrase (typically, but not always) that maybe accessed via an agent or keyring. For:
a. Symmetric encryption/decryption.
b. Public/private key pair encryption/decryption.
Many tools transparently will handle 2.b. for decryption.
For 2.a and 2.b (for encryption) what would the work flow/UX be for an end user of PT?
The text was updated successfully, but these errors were encountered:
a. Symmetric encryption/decryption.
b. Public/private key pair encryption/decryption.
Many tools transparently will handle 2.b. for decryption.
For 2.a and 2.b (for encryption) what would the work flow/UX be for an end user of PT?
The text was updated successfully, but these errors were encountered: