Jump to content

Comparison of secret managing schemes: Difference between revisions

imported>Lucc
imported>Lucc
Line 33: Line 33:
; runtime
; runtime
: where does the secret reside after system activation, is it encrypted, who can read it
: where does the secret reside after system activation, is it encrypted, who can read it
; encryption technology
: which programs or tools are used for encryption or decryption of secrets; whether {{ic|ssh-agent}}, {{ic|gpg-agent}} or similar are supported
; "official" project
; "official" project
: whether this is a published software project (maybe even actively developed) or just some notes in a forum or a blog entry
: whether this is a published software project (maybe even actively developed) or just some notes in a forum or a blog entry
Anonymous user