Open nus-pe-bot opened 2 weeks ago
Hi, thank you for your feedback and for raising this concern!
While it might initially seem like a flaw, this behaviour is a deliberate part of our security features and aligns with best practices for applications prioritising user data privacy.
This design prioritises security over convenience, a common trade-off in modern secure systems. By linking the password.txt
file (containing the hash and salt) directly to the user's ability to access their data, we ensure:
password.txt
is altered, the data becomes inaccessible, maintaining the integrity of the application.password.txt
file and avoiding tampering with it.
password.txt
file. Our design assumes that users will exercise basic caution, as tampering with or corrupting critical security files is not typical user behaviour.password.txt
is the best alternative while adhering to the project constraints.password.txt
file similar to how they would safe-keep a master password or recovery key in any other security-conscious application.We hope this clarifies why this behaviour is a feature and not a bug. Thank you!
--
Accidentally corrupting/editing the password.txt file unintentionally would be disastrous as now the user need to reset all the data inside VBook. This means that the user will lose all his/her data.
[original: nus-cs2103-AY2425S1/pe-interim#1339] [original labels: severity.Medium type.FeatureFlaw]