diff options
author | Joey Hess <joey@kitenet.net> | 2013-09-05 00:09:11 -0400 |
---|---|---|
committer | Joey Hess <joey@kitenet.net> | 2013-09-05 00:09:11 -0400 |
commit | 94718242872b9c17ccc1e4888328b124cb02dcac (patch) | |
tree | b46d29358889081d3d28f3c8a6190b97371cb030 /doc/design | |
parent | 48e7a83f8613690432f100886760135cfa3b5b0f (diff) | |
parent | 2f3b108d49c534e828cec8adceef7defc942b67f (diff) |
Merge branch 'encryption'
Diffstat (limited to 'doc/design')
-rw-r--r-- | doc/design/encryption.mdwn | 13 |
1 files changed, 8 insertions, 5 deletions
diff --git a/doc/design/encryption.mdwn b/doc/design/encryption.mdwn index 6a380abe1..cc0dd1684 100644 --- a/doc/design/encryption.mdwn +++ b/doc/design/encryption.mdwn @@ -103,14 +103,17 @@ use the special remote. ## risks -A risk of this scheme is that, once the symmetric cipher has been obtained, it -allows full access to all the encrypted content. This scheme does not allow -revoking a given gpg key access to the cipher, since anyone with such a key -could have already decrypted the cipher and stored a copy. +A risk of this scheme is that, once the symmetric cipher has been +obtained, it allows full access to all the encrypted content. Indeed +anyone owning a key that used to be granted access could already have +decrypted the cipher and stored a copy. While it is in possible to +remove a key with `keyid-=`, it is designed for a +[[completely_different_purpose|/encryption]] and does not actually revoke +access. If git-annex stores the decrypted symmetric cipher in memory, then there is a risk that it could be intercepted from there by an attacker. Gpg -amelorates these type of risks by using locked memory. For git-annex, note +ameliorates these type of risks by using locked memory. For git-annex, note that an attacker with local machine access can tell at least all the filenames and metadata of files stored in the encrypted remote anyway, and can access whatever content is stored locally. |