Quote:
Originally Posted by encol
yes it works, but i'm working to enhance it: actually password are stored as clear text inside the script, in the next version i want to store (encrypted) somewhere
|
;log s pass # show
;log h pass # hide
;log n old-pass new-pass # maybe? With a hard-coded pass only for initial install, new password stored encrypted somewhere (/var/local/etc/bookpass would be a good place - /var/local persists across Amazon updates).
Note:
Since it needs to touch the system image files -
This should be packaged with KindleTool (and model locked to Kindle5) -
There is a sample update_*.bin included with KindleTool as an example.
update_*.bin packages can contain any scripting required to install/un-install (and run as root).
Note:
For new packages, always use the most recent KindleTool in NiLuJe's snapshots threads - its model coverage is the most complete.
Hmm....
I don't think the Kindle can index or display an aes-256 encrypted book -

Maybe the KOreader people will pick up on this feature.
This would also be a good addition to Aries KindleMenu (with its information storage applications - whose data files would be good things to encrypt).