Feature #15027

Passphrase Strength Meter for Persistence Wizard

Added by huertanix 2017-12-08 20:44:49 . Updated 2017-12-09 06:03:17 .

Status:
Duplicate
Priority:
Normal
Assignee:
Category:
Persistence
Target version:
Start date:
2017-12-08
Due date:
% Done:

0%

Feature Branch:
Type of work:
User interface design
Blueprint:

Starter:
Affected tool:
Deliverable for:

Description

Most trainings I’ve helped with around Tails have surfaced the need for prerequisite training on credential security and how to choose a strong passphrase for persistent volumes. Most of the time, however, that in-person training is not possible, and users resort to using weak passwords, or passwords that they are convinced are strong because of the late-90s era password rules on website accounts that tell them they are choosing strong passwords but really are not.

Rather than rely on the long history of users choosing weak passwords, it would be great to include a passphrase strength meter when users are choosing an persistence passphrase. A lot of research has been done in this field and some researchers at CMU has released some of it here: https://engineering.cmu.edu/news-events/news/2017/05/11-password-meter.html including source code: https://github.com/cupslab/password_meter. Implementing something like this would help people choose strong passphrases to make their strong encryption worthwhile.

Note: A user can still change their strong passphrase to a weak one using the Disks utility after creating the partition in case if there’s some edge case that requires a weak password.


Subtasks


Related issues

Is duplicate of Tails - Feature #7002: Hint user about passphrase strength when creating a persistent volume In Progress 2014-03-31

History

#1 Updated by intrigeri 2017-12-09 06:02:37

  • is duplicate of Feature #7002: Hint user about passphrase strength when creating a persistent volume added

#2 Updated by intrigeri 2017-12-09 06:03:18

  • Status changed from New to Duplicate

Agreed, thanks! This is tracked by Feature #7002 already.