all it really takes is a lead pipe and some duct tape to “de-obscure” the password
Which is why many contemporary secure systems do not rely on permanent passwords (e.g. OTR messaging).
threat model
The usual: who is your adversary and against which threats are you trying to protect yourself?
Which is why many contemporary secure systems do not rely on permanent passwords (e.g. OTR messaging).
The usual: who is your adversary and against which threats are you trying to protect yourself?