Trac is being migrated to new services! Issues can be found in our new YouTrack instance and WIKI pages can be found on our website.

Changes between Version 3 and Version 4 of PlainTextPasswords


Ignore:
Timestamp:
May 9, 2007, 2:48:35 AM (17 years ago)
Author:
lschiere
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • PlainTextPasswords

    v3 v4  
    2424 * '''Store the password in plain text and control access to the file.''' This is what Purple does: the password is in {{{accounts.xml}}} in plain text, but the file itself is only readable by its owner.  We allow the user to determine under what conditions sensitive files should be opened (if at all), and what constitutes a breach of security.
    2525 * '''Lastly, you can not store passwords at all.''' This is Purple's default, and by far the most secure of all of the options.
     26
     27If you really wanted to, you could write a script to wrap Purple that
     28would decrypt {{{accounts.xml}}} and re-encrypt it when Purple exits.
     29You wouldn't be able to encrypt it while Purple is running,  because Purple
     30writes to {{{accounts.xml}}} for things like info change.  This would
     31minimize your exposure time unless (like me) you run Purple nearly 24/7.
     32Personally, I feel that on any decent operating system, if someone can get to
     33your files you should either be able to trust the person to not touch
     34them, or you shouldn't be storing sensitive information there at all.
All information, including names and email addresses, entered onto this website or sent to mailing lists affiliated with this website will be public. Do not post confidential information, especially passwords!