-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Tracker] Future-proof our encryption and encryption key management #785
Comments
gkc
added
enhancement
New feature or request
5 SP
5 Story Points - 3 Days Medium
labels
Nov 13, 2022
High-level design drafted and reviewed during PR49 |
gkc
changed the title
Future-proof our key storage, symmetric key encryption / decryption, symmetric key exchange, and data encryption / decryption
(Tracker) Future-proof our encryption and encryption key management
Nov 13, 2022
gkc
removed
Urgent
Urgent
PR50
PR51
PR52
PR53
enhancement
New feature or request
0 SP
No SP's assigned
labels
Feb 6, 2023
XavierChanth
changed the title
(Tracker) Future-proof our encryption and encryption key management
[Tracker] Future-proof our encryption and encryption key management
Jun 14, 2023
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Is your feature request related to a problem? Please describe.
@alice
having only one single shared symmetric encryption key for sharing data with@bob
, and@bob
likewise having only one single shared symmetric encryption key for sharing data with@alice
. We need to support each atSign sharing as many symmetric encryption keys as they like with another atSign, and choosing to encrypt data with any of those shared symmetric encryption keys they wishDescribe the solution you'd like
@alice
having only one single shared symmetric encryption key for sharing data with@bob
, and@bob
likewise having only one single shared symmetric encryption key for sharing data with@alice
. We need to support each atSign sharing as many symmetric encryption keys as they like with another atSign, and choosing to encrypt data with any of those shared symmetric encryption keys they wishHigh-level tasks (please add additional tasks here!)
The text was updated successfully, but these errors were encountered: