-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support encrypted client data #10
Comments
Our privacy policy as it's written now stipulates that we do this already. |
Bryan,
Trevor On Apr 8, 2014, at 2:43 PM, Bryan Valentini [email protected] wrote:
|
The privacy policy has been out for review for several weeks and I received no feedback. Feel free to modify as you like. You could even check it into github wiki if you wanted. |
Wouldn't encrypting data server side relegate us to a data storage locker? On Tue, Apr 8, 2014 at 2:48 PM, Bryan Valentini [email protected]:
|
Adam,
Trevor On Apr 8, 2014, at 3:52 PM, Adam Ohren [email protected] wrote:
|
Ah cool, gotcha. On Tue, Apr 8, 2014 at 3:54 PM, trevorcarlson [email protected]:
|
Though we already have encrypted the connection. I'm not sure what we're going to gain from encrypting the data again before sending it over an encrypted connection. |
Adam,
Trevor
|
Agreed that make sense for persistent data on the device to be encrypted. I On Tue, Apr 8, 2014 at 4:55 PM, trevorcarlson [email protected]:
|
To be secure, the data on the device can be encrypted with a client's Jeffrey Yangappssavvy http://appssavvy.com/ | Director of Platform On Tue, Apr 8, 2014 at 4:59 PM, Adam Ohren [email protected] wrote:
|
Jeff,
Trevor
|
My concern is that this is moving us towards a more blackbox environment Say for example a device's wifi/cell connection is broken and can't sync. So I guess the broader question is whether we're moving away from the On Wed, Apr 9, 2014 at 12:02 PM, trevorcarlson [email protected]:
|
I too share your concern, Adam, and I don't want to move to a closed service model for the reasons you stated. |
I'll chime in from how the current PoC in CA views this topic, which is So I'm assuming this same concept will be applicable for many more Now, as for other Use Cases, such as the consumer market or the school bus On Wed, Apr 9, 2014 at 1:54 PM, Bryan Valentini [email protected]:
|
One idea could be to improve the security of the data on the client itself, in case it was stolen, etc. We could do this by using a public-private keypair, where all of the data would be stored encrypted locally. Only when the data was sent back to the server would it be decrypted and stored in the database (or optionally, not decrypted, and only decrypted by the end user). We could allow the users to maintain their own keypairs, as well as handle revocation, etc. If we did a full encryption setup, then we'd need to have the keys to be able to analyze the data for the users.
The text was updated successfully, but these errors were encountered: