Native end-to-end encryption #253
Replies: 5 comments 13 replies
-
@bramblebird-ux interesting idea.
OpenCloud works with OIDC. So our access tokens are renewed every 5 mins (default). Every client (web, app, desktop) uses a different access token. OpenCloud itself is not holding the user credentials. How would these two solutions work under that circumstance? |
Beta Was this translation helpful? Give feedback.
-
Hi, IMHO E2EE is an important feature that's worth to spend some time on thinking how to do it right. Especially when I'm looking for SaaS offerings it's important to know what technical mechanism prevent the SaaS provider to get access to my or my cusotmer's data. |
Beta Was this translation helpful? Give feedback.
-
I’m not a fan of the idea of using a password to access key management. I believe we’re moving towards passwordless authentication, and I’m glad that Opencloud supports this through SAML/OAuth2 or SASL. E2EE definitely needs to work with FIDO2/WebAuthn! I’m concerned about privacy as a politically or journalistically active person. As @bramblebird-ux mentioned, I don’t want my cloud provider to associate or access my content. More importantly, I want to ensure the integrity of my files; I don’t want the provider to delete or alter files without my knowledge. E2EE helps with targeted file deletion, but it would be great if this feature could be enabled for specific folders. For a solution, I believe the mobile app (Android and iOS) should take on the responsibility of managing the E2EE private keys (Issue #16). Think of the app as a digital keychain. With this keychain, I can decide which doors I can see and which rooms I can enter. Whenever I want to access my E2EE files from another device, I should send a request to the mobile app to get permission to open a specific door. The app must confirm each access attempt. After I confirm on the app, it should show me the doors I’m allowed to enter (file names). When I want to step into a room (and open a file), I’d need to confirm again that I really want to go in. This way, I maintain control over what I can see and change. The digital keychain could also keep a history of when I opened which doors, so I can always track what’s happened. Does that sound complicated? I’m looking forward to your feedback and suggestions! |
Beta Was this translation helpful? Give feedback.
-
Is there a way to integrate the Open Source Tool https://cryptomator.org into the clients, such as https://mountainduck.io does? |
Beta Was this translation helpful? Give feedback.
-
Maybe encryption could work with a vault like openbao. This vault could store keys for fileencryption. for each folder a seperate key could be created and stored within openbao. Encryption could be implemented like in cryptomator or rclone. Main benefits:
Best regards |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
The opencloud project looks very promising but it still uses the old security model of central cloud services that leak all data once the server is compromised. There are already alternative solutions that show how this could be addressed through e2ee implemented using web technology. One open source example is Filen (doku) another commercial implementation with decent documentation is proton drive
These solution work by using the users login password as a key to encrypt all data on the client side (browser, app, desktop) before files are uploaded to the server. From the users point of view nothing changes but the resulting security is worlds apart from the previous approach that were attempted in next/owncloud.
I strongly believe that this should be offered as a native option in opencloud to provide an option for confidentiality that sets it apart from other solutions. The code to implement this is already available under AGPL and alternative solutions have shown this to be possible without requiring users to do any extra steps.
Beta Was this translation helpful? Give feedback.
All reactions