clarify why wiping hardware keystores works
This commit is contained in:
parent
a3c981a0f5
commit
a2991f9b12
@ -775,7 +775,7 @@
|
||||
<p>Changes since the 2024052100 release:</p>
|
||||
|
||||
<ul>
|
||||
<li>add support for setting a duress password and PIN for quickly wiping all hardware keystore keys to make all OS data unrecoverable followed by wiping eSIMs and then shutting down</li>
|
||||
<li>add support for setting a duress password and PIN for quickly wiping all hardware keystore keys including keys used as part of deriving the key encryption keys for disk encryption to make all OS data unrecoverable followed by wiping eSIMs and then shutting down</li>
|
||||
<li>disable unused adoptable storage support since it would complicate duress password support (support can be added if we ever support a device able to use it)</li>
|
||||
<li>increase default max password length to 128 to improve support for strong diceware passphrases, which will become more practical for people who don't want biometric-only secondary unlock with our upcoming 2-factor fingerprint unlock feature</li>
|
||||
<li>disable camera lockscreen shortcut functionality when camera access while locked is disabled to avoid the possibility of misconfiguration by adding the camera lockscreen shortcut and then forgetting to remove it when disabling camera access</li>
|
||||
|
Loading…
x
Reference in New Issue
Block a user