> The person spamming right now would be you. You just posted a link,
> without any explanations, any marketing blurbs, nothing.

I've explained everything as succinctly as I can in the readme. Pasting bits of 
it here would not benefit anyone.

> Why would I use your tool instead of something established, that has
> been properly audited — say, PGP for example?

Did you read the page? PGP and Privy are used for different things. A key 
manager could, though, use Privy to store private keys.

> How do I know your one-man project has no security holes, backdoors,
> or other vulnerabilities? How do I know that the encryption method
> chosen by you is sound? If there is no leaked data?

Privy is a thin wrapper around Cryptography's (OpenSSL) Fernet interface 
https://github.com/pyca/cryptography/blob/master/src/cryptography/fernet.py and 
https://github.com/hynek/argon2_cffi which is simply a binding to 
https://github.com/p-h-c/phc-winner-argon2

Privy itself is really just 40 SLOC 
https://github.com/ofek/privy/blob/a3d4bdb24464ad85606c1ab5e78c58ae489b0569/privy/core.py#L42-L82

> And I really dislike the description of your project ...
> What does “password-protecting” mean? Why is this not “encrypting”?

This is encryption, but specifically by means of a password. This paradigm is 
often tricky to get correct. 
https://security.stackexchange.com/questions/88984/encrypting-with-passwords-encryption-of-key-vs-data

> How do you expect this to work with API keys?

Encrypted keys would likely be stored in a DB somehow. Check out 
https://github.com/fugue/credstash
-- 
https://mail.python.org/mailman/listinfo/python-list

Reply via email to