-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Store files encrypted in sd-app AppVM #90
Comments
I'm thinking about this more now in the context of considering how to implement the conversation view in this client mockup and I'm now on the fence about this issue. If we store all documents and messages encrypted, it means that it will be difficult to create a responsive conversation view in the UI. We'd have to start the application and then start decrypting all the submissions/replies on disk (or do it on demand), making a user experience that would range from sluggish at best to incredibly annoying at worst. So taking a step back and considering what threats this is actually mitigating (to evaluate whether the hit to usability is worthwhile), we have:
|
I agree, I can't think of anything else, assuming the GPG private key is stored on The situation is a bit different if the key is protected with a passphrase, it would offer an extra layer of encryption for the GPG private key, and the documents would require an extra passphrase to decrypt. This mitigates the theft scenario. In the context of #100 (using hardware tokens to store GPG keys), I think the difference is even greater: it would require the token to be plugged into the workstation, as well as the token PIN. In the last two scenarios, decrypting the files as the client starts and caching those files in their decrypted form for the duration of the journalist's session might be a way to balance the user experience. |
We discussed this on 8/23. As a next step, we identified that more research is needed to document the user experience of passphrase-protected |
I tested the Qubes split GPG on my box today along with a password protected key. The good thing is that the GPG valut is prompting for the password using the |
Per discussion with @redshiftzero, we're removing this from the must-do alpha requirements. Without additional security mitigation the benefits here don't outweigh the immediate significant increase in complexity. We can reconsider post-alpha. |
Discussed at backlog review on 10/23, still something we may want to consider for defense in depth. |
Definitely needs further discussion and potential reexamination of the SDW threat model. |
Currently we decrypt files and store them decrypted in the
sd-app
AppVM. However, there is not a strong reason to store decrypted versions of these files as we can decrypt them only as needed (whether for the message/reply view described in #89's conversation view).Another approach might be to decrypt the files upon first download, store only some metadata in the
sd-app
AppVM (for the UI), and from then on out decrypt only on demand.The metadata we'd want to store about each file is:
2020-09-11: Edited to reflect current VM name - @eloquence
The text was updated successfully, but these errors were encountered: