Some things that vim keeps can leak information. I'm curious if there
would be any issues with encrypting backupdir, directory, undodir, and
viminfo files?
Basically, I'm thinking that either vim could either use a per file
pass based on a keyring or a global password. If this feature were on
and the password / decryption failed, a non-encrypted file could be
used (encrypted filetypes would be defined with an extension so having
one file with an encrypted and plaintext swpfile for instance, would
be sane). That or the file just isn't written/used if the feature is
on and no/wrong password is present.
Thoughts?
PS - If I open a file that allows write for a group I'm in, I can
write it and will get a swpfile with permissions for my default group.
This is a part of the data leakage I'm talking about.
PPS - https://github.com/jamessan/vim-gnupg does the right thing (with
not saving anything externally).
--
--
You received this message from the "vim_use" maillist.
Do not top-post! Type your reply below the text you are replying to.
For more information, visit http://www.vim.org/maillist.php
---
You received this message because you are subscribed to the Google Groups "vim_use" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vim_use+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
No comments:
Post a Comment