I have 2 crypted file with same password.
I would to open it with a step.
Do it is possible?
do it secure to get password in batch file and pass it as parameter?
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
Opening 2 files simultaneously means to be able to handle 2 volumes at the same times. This requires to redesign a large part of ProxyCrypt so I doubt to implement that.
You cannot pass the password through the command line: it would be too easy to retrieve.
However, you can pass a key file, even without password (-ko), but it is secure only if you are sure that nobody can access the key file.
You can even use a key file in which you put your password, retrieved with a batch file. But this means that you don't care about keyloggers and some complicated attacks, and you have something (for instance SDelete) to securely wipe the key file in which there is your password. You should also find a way to delete the key file just after the volume is mounted, and deal with the minimal size (64 bytes).
So I wonder if it is worth it.
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
I have 2 crypted file with same password.
I would to open it with a step.
Do it is possible?
do it secure to get password in batch file and pass it as parameter?
Opening 2 files simultaneously means to be able to handle 2 volumes at the same times. This requires to redesign a large part of ProxyCrypt so I doubt to implement that.
You cannot pass the password through the command line: it would be too easy to retrieve.
However, you can pass a key file, even without password (-ko), but it is secure only if you are sure that nobody can access the key file.
You can even use a key file in which you put your password, retrieved with a batch file. But this means that you don't care about keyloggers and some complicated attacks, and you have something (for instance SDelete) to securely wipe the key file in which there is your password. You should also find a way to delete the key file just after the volume is mounted, and deal with the minimal size (64 bytes).
So I wonder if it is worth it.