-
-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Keyring support #117
Comments
This is a great idea. Although, I still want to keep compatibility with SDA, so the encrypt and decrypt commands have to stay. Thanks for letting me know about this crate! |
What implications does this have for allowing users to back up their 2FA credentials? Would it be better to just use the keyring to store the encryption password instead of the shared secret and stuff? |
I think this could be an opt-in feature. So people who enable it should have enough knowledge what they are doing and where to find their credentials. |
- add keyring package - add keyring id field to manifest - automatically attempt to load encryption passkey from keyring - have decrypt delete the passkey on decrypt - have encrypt command ask if it should store the passkey in the keyring - fix lints closes #117
By using libraries like keyring-rs, one can store secrets into some platform-native credential managers, like serect service in Linux. Thus it can store serects into a password manager like KeePass.
Hopefully this could replace the encrypt and decrypt command.
The text was updated successfully, but these errors were encountered: