You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If you want to win extra security stars, lock down your keys with root ownership. By default they're already read/write by the user who ran the `cryptorious` command (0600), but you can increase this security more with `chmod root:root ~/.ssh/cryptorious_privatekey`. Now you'll have to run `cryptorious` with `sudo` and enter in your root password (ugh, passwords..) every time.
No printing, just a message that your decrypted password is now available in the paste buffer for your user.
138
141
142
+
If you've saved your vault entries with the URI of the site they belong to (i.e., ran `cryptorious encrypt github.com`...) then you can use the `-[g]oto` flag to open your default browser to this URI. Pair it with `-[c]opy` and the shorthand for `[d]ecrypt` and you'll have a fast way of navigating directly to your desired, secure website (let's also assume you've aliased `cpt=cryptorious`):
143
+
```
144
+
cpt d -g -c github.com
145
+
```
146
+
139
147
## Step 4: Rotate Keys & Vault
140
148
Compromised your keys? Not a problem.
141
149
@@ -148,3 +156,12 @@ cryptorious rotate
148
156
1. Generates new keys to `keyPath`
149
157
1. Decrypts vault using `privateKey.bak` and encrypts vault in place with new `privateKey`
150
158
1. Writes the vault back to disk at `vaultPath`
159
+
160
+
## Step 5: Generate Secure Password
161
+
The `generate` command also lets you generate random, secure passwords of `n` length:
162
+
```
163
+
cryptorious generate password --length 20
164
+
(yZkj,GX`w7T4x&TaYyw
165
+
```
166
+
167
+
This defaults to a length of 15 if you don't pass --[l]ength.
0 commit comments