question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Remove extraordinary-seeming claims of security

See original GitHub issue

We currently advertise ActivityWatch as secure. This makes me a bit uneasy since we rely on the host machine being compromised haven’t actually done anything except forbid connections from anyone else than localhost by binding to 127.0.0.1.

Things that could go wrong:

  • If an attacker hacks the host computer, all historical data is leaked unencrypted.
    • Could be solved by encrypted backups/sync.
  • More?

We don’t have much security in place right now (and we don’t use any crypto anywhere). That’s not a problem right now since there is little need: we don’t interact with anything outside the host system.

Anyway, removing claims of security and instead focusing on advertising privacy would feel a lot more honest.

Places where we might make claims about security:

  • README
  • Docs
  • Website

It’s my ambition that we one day will be able to once again claim some above non-standard level of security. But it might be a while.

Edit: I just had a crazy déjà vu. Feels like I’ve written about something similar before.

<bountysource-plugin>

Want to back this issue? Post a bounty on it! We accept bounties via Bountysource. </bountysource-plugin>

Issue Analytics

  • State:closed
  • Created 6 years ago
  • Reactions:1
  • Comments:10 (6 by maintainers)

github_iconTop GitHub Comments

1reaction
ErikBjarecommented, Feb 5, 2019

@Otto-AA I agree that would be great, but that plan is currently on hold. However, encryption of data will become a lot easier with the import/export system being put in place (almost done, I just need to add an import-button in the web UI). With this, a quick solution would be to: export bucket, encrypt the export, delete bucket in the server, then decrypt + import the export to restore/visualize.

This could be built as a ActivityWatch client, and anyone who’d be willing to build an MVP would greatly speed up the process.

1reaction
Otto-AAcommented, Feb 5, 2019

Are there any future plans on this?

I personally feel a bit uncomfortable knowing, that anyone who gets access to my computer at one time (either virtual or physical) can download my whole interaction with it. If this was limited to 7/30 days, and all events past this would be encrypted and/or summarized (#189 ) I would feel much more secure. Encrypting would be good against unintended physical access of the computer and (judging from my narrow knowledge about this topic) make it harder to automatize the attack. Summarizing would only give vague use statistics instead of an extremely detailed one.

That’s why I would love an option to encrypt/summarize old events. But I understand if you have other priorities, just want to know the status of this 😃

Read more comments on GitHub >

github_iconTop Results From Across the Web

50 U.S. Code § 1701 - Unusual and extraordinary threat
Any authority granted to the President by section 1702 of this title may be exercised to deal with any unusual and extraordinary threat,...
Read more >
706-Rejection of Claims - USPTO
In making the final rejection, all outstanding grounds of rejection of record should be carefully reviewed, and any such grounds relied on in...
Read more >
Chapter 4-Security Management, from Safeguarding Your ...
Security management consists of nurturing a security-conscious organizational culture, developing tangible procedures to support security, and managing the ...
Read more >
Chapter 2 - Extraordinary Ability - USCIS
A. Eligibility When seeking classification as a person of extraordinary ability, a petitioner files an Immigrant Petition for Alien Workers ...
Read more >
Weakened Encryption: The Threat to America's National Security
In short, requiring exceptional access to encrypted technologies would undermine national security by: Weakening protections for the information ...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found