Close

Current status and progress #5: Beginning to work with the beta testers and polishing our user interface

A project log for Mooltipass Offline Password Keeper

Offline password keeper project created by and for the Hackaday community

mathieu-stephanMathieu Stephan 08/11/2014 at 07:411 Comment

Dear Mooltipass enthusiasts,

Shenzhen was an awesome place to visit and full of interesting people to meet. During my time there I had the opportunity to spend a complete day at our assembler's to check the beta testers units and teach them how to assemble the Mooltipass. As the team didn't want to wait for one month (or more) for the beta testers to receive their prototypes, we opted for DHL delivery.

Here is our newsletter #5:

- All the beta testers received their prototypes! As you can guess, they received it much earlier than we thought they would. They're currently waiting on the development team to send them a first firmware to test, as we want the latter to be as user friendly as possible.

- Some beta testers actually couldn't wait, decided to take matters in their own hands and compile the firmware from the github repository... so we've already received very interesting feedback!

- Some of them decided to have fun with our graphics generation tools...

- We've written several tutorials to teach the beta testers how to update their Mooltipass and made several forms to gather all ideas/suggestions/remarks they may have

- On the firmware side we're currently working on polishing our user interface to make it as simple as possible (we can't emphasize this enough!). The flash management library still needs to be finished though.

- We're having difficulties finding someone who could make a small animation video to explain the Mooltipass without ruining our non-existing budget. If you know someone, please let us know!

- The chrome plugin is getting better by the day, we're improving our login/password fields detection algorithm

- We designed a nice Mooltipass stand that can be CNCed or 3D printed

As you can guess we're very close to having a finished product! We're quite confident that the next newsletter will inform you guys how to get your hands on one.

Cheers,

Mathieu & the dev team

Discussions

Anthony wrote 09/13/2014 at 06:46 point
I think you have a really unique concept, and also feel an important suggestion where I unfortunately feel I have not the experience to directly help. Providing access to second point encryption on the PC itself is an excellent thought-- Yet it seems to me that most exploits these days are not conducted on behalf of the singular 'user'-- If any of us were so rich, security would be much less of an issue to us. We could keep it under our bed, even with the inflation loss, and tell the rest to *$*f! off.

Obviously, we're not like that--

Rather, the concern relates to infrastructure attacks, which it seems are/or are becoming more common.

I am sure this has been thought of, but wouldn't it be great to have a script that would re-generate a random AES crypto-password at a specified/random hour of the day ?

It would be both less a burden of storing my credentials securely, externally, but also place more emphasis on where it is due--

Protecting one's own server is one thing, but when 'consumer's' feel they must begin protecting themselves against the lapses in erstwhile services, it is another.

Yet I can see this device being a very worthwhile step before we transcend/or forget (perhaps, ultimately, the net will be open, and we will only show up to do certain things here, rather than everything, or the hang-over of utopia will dry out-- I hope or believe not, because of the simple fact I am able to interact with my 'neighbors' who are not my Nieghbors I think you have a really unique concept, and also feel an important suggestion where I unfortunately feel I have not the experience to directly help. Providing access to second point encryption on the PC itself is an excellent thought-- Yet it seems to me that most exploits these days are not conducted on behalf of the singular 'user'-- If any of us were so rich, security would be much less of an issue to us. We could keep it under our bed, even with the inflation loss, and tell the rest to *$*f! off.

Obviously, we're not like that--

Rather, the concern relates to infrastructure attacks, which it seems are/or are becoming more common.

I am sure this has been thought of, but wouldn't it be great to have a script that would re-generate a random AES crypto-password at a specified/random hour of the day ?

It would be both less a burden of storing my credentials securely, externally, but also place more emphasis on where it is due--

Protecting one's own server is one thing, but when 'consumer's' feel they must begin protecting themselves against the lapses in erstwhile services, it is another.

Yet I can see this device being a very worthwhile step before we transcend/or forget (perhaps, ultimately, the net will be open, and we will only show up to do certain things here, rather than everything, or the hang-over of utopia will dry out-- I hope or believe not, because of the simple fact I am able to interact with my 'neighbors' who are not my Neighbors, and
so exchange thoughts.

But I think if Mooltipass is to be truly 'Democratic', then who cares if the service requires me to eat a minimal amount of bandwidth daily to protect myself. SaaS, and PaaS, are quite democractic thoughts that are begging to alter, especially for the newest generation, how we live life.

In the interim, it is also important to remember that unless you run your own business, 99.9% percent of the services you must 'log-in-to' are making money off 'us'.

It is worth, at least, an effort to put the burden in the right place.

Having 'customers' is a privilege, too.

  Are you sure? yes | no