Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: encrypt Stacks' store, keeping the encryption key in the macOS keychain #60

Open
cablehead opened this issue May 2, 2024 · 0 comments
Labels
help wanted Extra attention is needed privacy-security

Comments

@cablehead
Copy link
Owner

cablehead commented May 2, 2024

Hopefully this is how the macOS keychain works:

Stacks automatically retrieves a stored key from the macOS Keychain upon system restart or user login, without requiring any user intervention, by using a predefined service and account name unique to Stacks. This process is secure because the Keychain item is protected by access controls that limit access solely to the Stacks application, preventing other apps or malware from accessing it. Additionally, macOS enforces application sandboxing and encrypts Keychain data, ensuring that even if unauthorized access to the machine occurs, the Keychain contents remain protected.

From @ntawileh:

your use case is probably more user-centric, so you want to do login keychain. And yes, it can be retrieved without user interaction as long as the user is logged in and it can/should also be scoped by the binary retrieving it so other apps running in the same user context cannot fetch it

if successfully, add this to the list of things to consider for linux and windows support

@cablehead cablehead added the help wanted Extra attention is needed label Jun 4, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Extra attention is needed privacy-security
Projects
None yet
Development

No branches or pull requests

1 participant