Principle

Selection of Cryptographic Algorithms

  1. Choose a mature algorithm;

  2. Select an algorithm for precipitation over time;

  3. Choose an algorithm that is mathematically proven to be safe;

  4. Select the algorithm that is widely used in the production environment;

Privacy

  1. Avoid touching anything entered by the user;

  2. The non-storage content entered by the user should become part of the key entropy to improve the key strength;

  3. The user's data content is only visible to the user, and each access must be authenticated;

  4. Obfuscate as much as possible to improve privacy by adding randomness;

Safety

  1. In the time that the user can tolerate, the encryption time is extended through the algorithm to increase the attack cost of the adversary;

  2. Security should be ensured through algorithms and encryption processes, and security enhancements by introducing third-party roles should be avoided, which may be a hidden danger in the long run;

  3. Security design should start from this perspective: anyone can be an attacker of the system, and any link will have loopholes;

Stay Open

  1. Any organization or individual can develop a new encryption process and submit it to the seedlist code repository;

  2. Anyone can use it freely and store any small-sized content at will;

Product Form

  1. Keep it simple;

  2. Minimize the burden on users;

  3. Do not rely on centralized servers;

Last updated