Summary: | directory-tree/file data stored for encrypted volumes | ||
---|---|---|---|
Product: | [Applications] dolphin | Reporter: | PattiMichelle <miche1> |
Component: | general | Assignee: | Dolphin Bug Assignee <dolphin-bugs-null> |
Status: | CONFIRMED --- | ||
Severity: | grave | CC: | kfm-devel, miche1, nate |
Priority: | NOR | ||
Version: | unspecified | ||
Target Milestone: | --- | ||
Platform: | unspecified | ||
OS: | Linux | ||
Latest Commit: | Version Fixed In: | ||
Sentry Crash Report: |
Description
PattiMichelle
2020-12-11 17:41:18 UTC
It is also storing thumbnails of external volumes to the home folder. The thumbnails could reveal secure information (e.g. for text files). We need a way to find out if a local path is actually a path to an encrypted volume or folder. Are there calls which determine if luks or vera/true-crypt are in use? Maybe just don't store any removable drive's information? Drives in fstab could get a flag? Maybe for starters the idea about a "clear history" function with classes of affected drives (removable, fstab, etc....) Sorry I don't know more about deep (or even shallow) linux... |