1
edit
Elmerfudd321 (talk | contribs) (→A possibly better way to secure the data: new section) |
|||
Line 219: | Line 219: | ||
Set ''browser.sessionstore.max_resumed_crashes'' to 0. Firefox will ask after a crash which windows/tabs to restore. See more [[Session_Restore#Preferences|Preferences]] on front page. [[User:Hbbb|Hbbb]] 07:22, 27 October 2009 (UTC) | Set ''browser.sessionstore.max_resumed_crashes'' to 0. Firefox will ask after a crash which windows/tabs to restore. See more [[Session_Restore#Preferences|Preferences]] on front page. [[User:Hbbb|Hbbb]] 07:22, 27 October 2009 (UTC) | ||
== A possibly better way to secure the data == | |||
One way that Firefox could secure the session restore automatically is using a hybrid asymmetric (like RSA, DSA, or ElGamal) and symmetric (like AES, Blowfish, Twofish, 3DES, or Serpent) encryption setup like what SSL, TLS, and PGP use. | |||
All it needs to do is create a asymmetric key pair with a password encrypted "Private Key" the first time Firefox opens and then whenever you load up Firefox it quickly creates a temporary symmetric key which it uses for that session to encrypt the session restore data with and it encrypts the temporary symmetric key with your asymmetric "Public Key". So then if you ever need to restore your session you will need your private key and the password the private keys encrypted with to decrypt the sessions temporary symmetric key. | |||
With asymmetric encryption you have a key pair with 2 keys a "Private Key" and a "Public Key" and you can give everyone your public key and when you encrypt something with someones "Public Key" the only way to decrypt the data is with that persons "Private Key" and the password the private key is encrypted with (technically it is possible to create a "Private Key" that isn't encrypted with a password then all you need is the "Private Key" to decrypt the data) |
edit