https://bugs.kde.org/show_bug.cgi?id=410457

--- Comment #5 from Elias <supg...@gmail.com> ---
(In reply to Ivan Čukić from comment #4)
> To repeat, if you want encryption just for the cloud sync, which is unlocked 
> while you're logged in, Vault is not the solution. It is not Vault's 
> use-case. Vault is *not* going to support use-cases which blur the best 
> practices for its use-case.

Why is this not a use-case for plasma-vault?

This makes no sense because the default backend (cryfs) is mainly made for
exactly this purpose.
The first sentence on its website (https://www.cryfs.org/) is:

"Keep your data safe in the cloud"

So while cryfs is especially made for the cloud, it seems really off for
plasma-vault as a frontend to not support its main functionality.

In fact, cryfs and gocryptfs are perfect solutions to encrypt cloud storage.
EncFS was too in the past, but is not recommended anymore due to found security
issues.


> One of the interesting things I've been researching recently (which might end 
> up as a new KDE project at one point) is git+gpg which provides a nice 
> end-to-end encryption. The local files are not encrypted, but they are sent 
> properly encrypted to a git server. This would be a good tool for your 
> use-case.

While I think this would be an interesting project, it doesn't fit my use case.
My cloud is a simple file storage. The client just copies the files over. This
simple filesystem is just right, so I don't need a more complicated setup like
a git server. Also, I guess you can't just setup a git server on Dropbox or
Google Drive anyway, so this won't work.


> As mentioned before, the alternative is to set up the usual encrypted $HOME 
> (or some other directory) and sync the encrypted data with your cloud 
> provider. This would have the benefit of gpg+git with added protection 
> against device theft if it is stolen while powered off.

Also as mentioned before, this is not the solution for my use-case. The only
thing I want to prevent is that the people having access to the server my data
is stored on can not read it unencrypted.

Encrypting home will bring zero benefit for this. Since the cloud sync software
runs under my user after login, it will see the decrypted files and so upload
them unencrypted. This does not help at all in this use-case.

Also I'm already using Full Disk Encryption, so I'm already safe against device
theft.

---

I do not sacrifice security if the password is stored on my machine. This is
fine, since the cloud provider can't access my machine where the key is, they
will only get the encrypted vault / files which they can't ready without the
key.

Also, implementing a "save password" option would be good for consistency.

Plasma does already support saving the password for for example external
encrypted disks / storage.
Now imagine the cloud as another "external storage" since it is exactly this.

It would make sense for plasma to be consistent and support the same
functionality (in this case saving the password) for all encrypted external
storages the same.

---

And, just to be complete, here is one last reason to implement a password save
option:

Linux and Plasma are all about freedom and giving the options.
To refuse users use-cases seems off in this philosophy.

Nobody will be force to use this option when it is there, so it won't hurt
anyone, but only help some :)

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to