The Documentation will be put on the web in stages.
In many countries journalists and human rights workers are under threat from the authorities who wish to know what the journalists have written. The contents of what has been written can cause the journalists or human rights workers to be killed. In these countries it would be prudent for the journalists to keep their work encrypted. The encrypted work requires knowledge of the passwords which could be beaten out of the journalists or human rights workers. A good journalist will keep a record of different sources in order to verify the accuracy of the story. The sources could be compromised by passwords to encrypted files being extracted from the journalist/human rights worker under torture. If the journalist human rights worker cannot know what the password is then no amount of torture can extract the password.
The program has the ability to load and edit keyboards to help ensure that passwords cannot be known. A loaded keyboard can be destroyed. No keyboard no password. A keyboard can be loaded here to be used later when accessing a password file or can be loaded at the time of entering a password to a password data file.
The keyboard has another important
use. The strength of an encrypted work depends on three things
The use of a password that is not in a password cracker's database requires a random password. Long random passwords are extremely difficult to remember unless they are practised being used frequently. The use of a Screen keyboard enables the typing of awkward characters and enables the typing of long random passwords. By having different keyboards which can be created and saved the creation of difficult to remember random passwords is made easier. At the same time remembering of a typed keyboard password can be made very difficult if not impossible to remember.
Another important point is that people find it difficult to navigate computer programs from user descriptions. Many people can recognise a computer program they have used. Many of these same people have great difficulty describing the program to someone else. This is useful in that it adds difficulty and thus makes it difficult for a human rights person to describe program usage description under duress.
Programs like Truecrypt, Veracrypt, Drivecrypt and others which work on encrypted partitions/containers need long random passwords for security.
|Password Manager||Many websites have a requirement for a login password. Each
website needs a different password. With so many websites it
becomes impossible to remember all the passwords. Thus there
becomes a need for a password manager. A password manager
need long random passwords for security.