Total hours: 243.650
1) Authorization and Deployment Concept
This is very tricky but partially depends on not having a properly design threat scoping concept.
The idea is have access keys which are seperate from the account in the event of a compromised system nuke, and remove,
The problem though is it’s impossible to have a secure E2E encryption without a key being stored somewhere (like the persons brain or hardware key).
If it’s the first it’s adding the ‘just one more password...
Total hours: 245.633
1) Experimenting with Key Derivation
This is tricky since it involves ensuring proper key provisioning while ensuring that Sapphire Pack has no access to your data at all.
2) Exploring Yubikey for security
I like the concept because I’d be able to use a several key derivation concept and using asymmetrical keys to design. ECC p384 which is secure till past 2031 which is extremely important.
3) Financial feasibility of using Yubikey
Not worth it at allx. Not...