Quoting Jason Keirstead : > If someone has login access to the machine and read access to the KWallet > files, all he has to do is copy off the files and brute-force attack them > later. So the whole thing is pretty much moot. Sorry, when did you last brute-force a relatively large chunk of data encrypted 16 rounds blowfish with a key generated with 1000 rounds of SHA-1? I would like to see this hardware. -- George Staikos KDE Developer http://www.kde.org/ Staikos Computing Services Inc. http://www.staikos.net/ >> Visit http://mail.kde.org/mailman/listinfo/kde-devel#unsub to unsubscribe <<