-
Notifications
You must be signed in to change notification settings - Fork 11
Closed
Description
With the latest version, the release notes state:
Removed comparison of the QuickUnlock key and the input of the user. Instead this version encrypts the master key of the database with the QuickUnlock key and decrypts the master key with the user input. If wrong user input is provided the decryption just generates garbage and the database stays locked.
When the master key is encrypted, how safe is this process? Is this stored in memory and destroyed when KeePass closes? Can you elaborate how it works to assure everyone that may have similar questions?
This is extremely handy (just like the keepass2Android feature) and is a life saviour. It's not fun retyping a long key every 10min!
Cheeers
Metadata
Metadata
Assignees
Labels
No labels