A warning that this is a fairly non-traditional request that I do not expect any kind of official support or endorsement for what I'm attempting.
While I'm alive, I don't want any kind of enemy or state action to even possibly compromise my security, so I'm opposed to printing out or writing down my master password even in a safety deposit box.
However, upon my death, I would like things ready for an executor to use files available to begin a cracking process that may not gain them entry for several weeks or months. Provided they have the secret key and my master password is crackable in the desired amount of time, what information from 1Password10.sqlite (the new format) is required to facilitate this? I'm comfortable extracting information from the sqlite database and running it through hashcat or john the ripper. None of the tools available now seem to be able to operate on the new format.
Further, it would be ideal if the encryption keys were separated from the data, including my e-mail address, so that if my executor needed to crowdsource the action or enlist others to assist in some way, those others would be able to provide him with the cracked master password without knowing precisely which account it goes to so that only he can log in.
How much of the above is feasible? Is the data now in the
keysets table? Can someone provide an example of converting a query from the Windows sqlite into a hashcat command?
1Password Version: Not Provided
Extension Version: Not Provided
OS Version: Windows 10
Sync Type: Not Provided