It looks like the key-derivation function used here is just a single iteration of sha256 followed by truncating.
I'm not a security expert, but I'm pretty sure that's insecure.
Consider using PBKDF2 or Argon2.
Submit screenshots of all your *NIX desktops, themes, and nifty configurations, or submit anything else that will make themers happy. Maybe a server running on an Amiga, or a Thinkpad signed by Bjarne Stroustrup? Show the world how pretty your computer can be!
It looks like the key-derivation function used here is just a single iteration of sha256 followed by truncating.
I'm not a security expert, but I'm pretty sure that's insecure.
Consider using PBKDF2 or Argon2.
Gosh, I've really messed up. Fixing immediately, thank you for bring this to my attention -- and I apologize to all y'all.
Again, I'm not a security expert, so maybe your original version was fine for this use case.
But since dedicated password-based key derivation functions exist, you should probably stick to one of those instead of rolling your own.
Thanks for fixing this quickly!
I haven't used tomb and I don't think I really have a usecase for this, but I respect the on-brand command aliases.
This is very interesting. I've bookmarked it, to play around with it later. Thanks!
What DE are you using? As very little provide vertical bars and for my UWQHD that would be good.