| Summary: | directory-tree/file data stored for encrypted volumes | ||
|---|---|---|---|
| Product: | [Applications] dolphin | Reporter: | PattiMichelle <miche1> |
| Component: | general | Assignee: | Dolphin Bug Assignee <dolphin-bugs-null> |
| Status: | CONFIRMED --- | ||
| Severity: | grave | CC: | dolphin-bugs-null, miche1, nate |
| Priority: | NOR | ||
| Version First Reported In: | unspecified | ||
| Target Milestone: | --- | ||
| Platform: | unspecified | ||
| OS: | Linux | ||
| Latest Commit: | Version Fixed/Implemented In: | ||
| Sentry Crash Report: | |||
|
Description
PattiMichelle
2020-12-11 17:41:18 UTC
It is also storing thumbnails of external volumes to the home folder. The thumbnails could reveal secure information (e.g. for text files). We need a way to find out if a local path is actually a path to an encrypted volume or folder. Are there calls which determine if luks or vera/true-crypt are in use? Maybe just don't store any removable drive's information? Drives in fstab could get a flag? Maybe for starters the idea about a "clear history" function with classes of affected drives (removable, fstab, etc....) Sorry I don't know more about deep (or even shallow) linux... |