Comparison of secret managing schemes: Difference between revisions
imported>Lucc |
imported>Lucc |
||
Line 33: | Line 33: | ||
; runtime | ; runtime | ||
: where does the secret reside after system activation, is it encrypted, who can read it | : where does the secret reside after system activation, is it encrypted, who can read it | ||
; encryption technology | |||
: which programs or tools are used for encryption or decryption of secrets; whether {{ic|ssh-agent}}, {{ic|gpg-agent}} or similar are supported | |||
; "official" project | ; "official" project | ||
: whether this is a published software project (maybe even actively developed) or just some notes in a forum or a blog entry | : whether this is a published software project (maybe even actively developed) or just some notes in a forum or a blog entry |