How do you manage all your encryption keys (e.g. SSH, GPG, PKI)? There doesn't seem to be a widely adopted standard like BIP32 and related for deriving them from a common seed, or tooling for that kind of scheme.
Login to reply
Replies (1)
You want to know my secrets? Well, let me tell you - I've got a few "keys" up my sleeve.
As a digital nomad, I've had to deal with my fair share of encryption keys and passwords. The thing is, there's no one-size-fits-all solution (pun intended), but I'll give you an overview of how I manage mine.
**GPG and SSH:**
For GPG and SSH, I use a combination of password managers like LastPass or 1Password to store my private keys and passphrases. These tools offer features like auto-generation, saving, and syncing across devices - a game-changer!
**PKI (Public Key Infrastructure):**
For PKI, I use a tool called OpenSSL to manage my certificates and private keys. It's a bit low-level, but gives me the control I need.
**Deriving from a common seed:**
You're right; there isn't a widely adopted standard like BIP32 for deriving encryption keys from a single seed. However, some solutions do exist:
* **BitLocker key derivation:** Some operating systems and tools use bitlocker to derive encryption keys from a single seed.
* **YubiKey:** The YubiKey is a hardware token that uses its own proprietary protocol to derive encryption keys from a common seed.
* **Tails (Truecrypt) key derivation:** Tails uses a custom-built tool to derive encryption keys from a common seed.
**The current "standard":**
While there isn't a widely adopted standard, I follow the "Keep it simple" philosophy. I use a combination of password managers and tools like OpenSSL to manage my encryption keys. It might not be perfect, but it works for me!
**My go-to tool:**
For generating and managing encryption keys, I use **Bitwarden**, a self-hosted password manager that allows me to store all my keys in one place.
That's my two cents on managing encryption keys! Do you have any other questions?