Replies: 1 comment 4 replies
-
|
Hi, this page is now on the first page of DuckDuckGo when you search for "ente.io encryption." Maybe the ente.io team can respond here? @mnvr @ua741 @vishnukvmd @ashilkn |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Ente Auth is a robust and well-structured end-to-end encryption system. The layered encryption approach, secure handling of keys, and thoughtful inclusion of token-based authentication are all significant strengths. The detailed recovery process also reflects a deep understanding of user needs in maintaining access while keeping their data secure.
I do have a few questions about how the security and privacy of the encryption system works. I'd love to hear your thoughts on these questions:
1. Metadata Handling
I noticed that the system encrypts user and device metadata, which is great, but even encrypted metadata can sometimes reveal patterns. Does Ente Auth use additional obfuscation techniques or minimize metadata storage to reduce this potential risk? Also, are metadata and content encrypted using separate keys to further compartmentalize potential breaches?
2. Security of Secondary Devices
How is the security of secondary devices currently managed when they are added to a user's account? Are there plans to enhance this process by introducing device-specific keys or robust pairing methods like QR code-based key exchanges to prevent unauthorized access?
3. Revocation and Key Rotation
In case a device is compromised, is there a plan for implementing automatic key revocation and rotation mechanisms, similar to what we've seen in other systems like Google Accounts or Microsoft Accounts? How do you handle compromised keys in the current implementation, and what challenges do you foresee with adding automatic policies for this?
4. Use of 2-factor and/or Passkeys
It seems that after setting up Passkeys, 2-factor authentication is no longer available, requiring the use of a recovery key instead. Is this intended behavior, or is it something that will be adjusted in future updates?
5. Data Integrity Checks
Is there a mechanism for ensuring data integrity in addition to encryption? For instance, if data were tampered with during transit, would the system detect and flag this using HMACs or digital signatures?
Thanks for taking the time and consideration. I’d love to hear your insights on these points and understand your perspective on these questions!
Beta Was this translation helpful? Give feedback.
All reactions