47a2f5e8b6
* initial password key derivation design * some typos/clarifications * point out that clients can ignore bucket entropy * clarification about offline table generation * change proposal to only do network requests when inputting passwords * make algorithm have shorter lines * fix algorithm example * be explicit about allowing already-formed root keys * go back to having a salt in the project/bucket metadata * some proofreading/clarifications * feedback and clarifications * clarify definition of root key |
||
---|---|---|
.. | ||
audit-containment.md | ||
garbage-collection.md | ||
marketing-offer-program.md | ||
mountable-drive.md | ||
password-key-derivation.md | ||
TEMPLATE.md | ||
uplink-scopes.md |