mirror of
https://github.com/BoostIO/BoostNote-App.git
synced 2026-04-27 05:15:56 +03:00
[GH-ISSUE #519] Protect a note with a password #258
Labels
No labels
android 🤖
assigned to core 🦹
bug 🐛
documentation 📚
documentation 📚
duplicate 🚫
external issue 🔼
external issue 🔼
feature request 🌟
funded on issuehunt 💵
help wanted 🆘
improvement request 🔨
improvement request 🔨
ios 🍎
mobile 📱
needs investigation 🔬
needs more info ℹ️
needs specs 📐
plugin idea 🔌
plugin idea 🔌
poll 🗳️
pull-request
question ❓
rewarded on issuehunt 🎁
security issue 🔑
won’t fix ❌
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/BoostNote-App#258
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @mnmami on GitHub (Jul 2, 2020).
Original GitHub issue: https://github.com/BoostIO/BoostNote-App/issues/519
This is a feature request/wish. It would be really awesome if it was possible to protect access to a note (perhaps also folder). A simple password would do.
@huzibizi commented on GitHub (Jul 22, 2020):
it would be even better if it could be encrypted with the password, with a good strong encryption like AES. it would make the files hard/impossible to recover if you forget the password - but it would be great having it available as an option.
Maybe something like that. (for now you can just store your boostnote storages on a partition encrypted with Veracrypt or something similar though i guess, or something like boxcryptor if you're using a cloud service)
It would be cool if the user could choose the encryption method too but not necessary,
@Rokt33r commented on GitHub (Aug 23, 2021):
@mnmami How much security level do you need?
@Rokt33r commented on GitHub (Aug 23, 2021):
You can suggest other options. We just want to know how many security measures do people need.
@mnmami commented on GitHub (Aug 23, 2021):
Thanks, @Rokt33r. Among the two options, I would like to have E2E data encryption.
I'm no expert in the field, but I can also think of access token-based authentication, e.g. SSL private key (is it option 1 from above?), an app-specific authenticator file, some standardized authenticator provided by third parties e.g. Google, Microsoft, etc.
@Rokt33r commented on GitHub (Aug 24, 2021):
@mnmami I don't understand what you exactly want to have. Do you want us to implement somewhat 2-factor verification for an individual document?
@huzibizi commented on GitHub (Aug 24, 2021):
What joplin does is perfect, if you could replicate their end to end encryption functionality that would be great, i use it with nextcloud and it encrypts all my notes synced there, works very well: https://joplinapp.org/spec/e2ee/
Functionality allowing the user to protect and encrypt a note stored locally (that wouldn't otherwise be encrypted with e2ee) would be useful too, but i guess less important, because to encrypt those local notes the user could just encrypt their system drive instead.
@mnmami commented on GitHub (Aug 24, 2021):
Sorry @Rokt33r for the confusion. Please see the updated comment with the intended quote.
@Rokt33r commented on GitHub (Aug 31, 2021):
@huzibizi I don't think we can provide the same feature of Joplin app.
It seems Joplin syncs the whole data and decrypted it from each client. But our service is sending data on demand. So our server needs to understand what the client requests. It means our app needs to understand the storage structure of the user's storage. Also, the OP is asking about protecting a single note, not encrypting the whole storage.
Quite similar to the first reason. Our real-time server needs to read changes from clients to resolve any conflicts among them and generate revisions.
So I think we need a different approach. What experience do you exactly want to have?
Although It's not E2EE, we can still send encrypted payload for every HTTP request and web socket communication. But our backend still needs to read the data to provide the basic functionality, navigating, authoring, and anything else.
We can also introduce a new feature like "encrypted blocks" which can be embedded on a document but cannot open until further authentication is done. It can be E2EE. Its contents are completely unreadable from our backend. So we cannot provide real-time editing for the blocks.
@Rokt33r commented on GitHub (Aug 31, 2021):
@mnmami How do you think about the idea, "Encrypted blocks" in https://github.com/BoostIO/BoostNote-App/issues/519#issuecomment-909085712
@mnmami commented on GitHub (Sep 1, 2021):
@Rokt33r yes, also a very good idea.