Closed mshedsilegx closed 9 months ago
Please go into more detail how this increases security over the current measures:
So what's the benefit of placing a plain text password on the already strongly encrypted secret?
That would add an additional protection if the OTS link has been forwarded incorrectly or compromised
TBH: 99.99% of the users will either omit this or send the password the same way the link was sent. Most likely in the same message. Is the complexity really worth it?
Also the example screenhots you provided: They are sending the secret and the password in plain text to the server and are calling that "secure" and "secret"… They are not a reference.
So how would this work? The secret is encrypted with a random password and sent to the server as currently. What's happening to the password?
I'm not convinced this is a useful addition. It makes stuff a lot more complex, in certain ways of implementing it, it will expose information which shouldn't be there. In other ways it violates the "zero knowledge" principle in the backend by making i.e. the password known to the backend.
OK, let's close this
I would be a welcome addition for the secret sender to be able to passphrase protect a secret. Similar to the below:
For the recipient, the secret could not be access without entering the correct passphrase:
I think that provides another layer of protection that is useful in several test cases.