Replies: 1 comment 5 replies
-
Hello, What would happen for unencrypted database in case of option 2 ("Encrypt temporary files unconditionally") ? If temporary files are always encrypted, what will be the key and algorithm in case of plain database ? |
Beta Was this translation helpful? Give feedback.
5 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Recently there was a discussion about encrypting temporary SQLite files (see issue #148). Currently, SQLite3 Multiple Ciphers uses the compile time option
SQLITE_TEMP_STORE
to select that temporary data are always stored in memory, because storing unencrypted temporary data in files creates a security risk for encrypted databases.However, in principle this option can be overwritten by the user, for example if an application has memory restrictions which make holding temporary data in memory unfeasible. In such use cases, encrypting temporary data could be mandatory to prevent breaching secret data.
The encryption extension based on the officially unsupported and undocumented
SQLITE_HAS_CODEC
compile-time option (which was used until its removal in February 2020) did not support to encrypt temporary data. However, the new implementation of the encryption extension would allow to reconsider the encryption of temporary data.So far, users of SQLite3 Multiple Ciphers have not explicitly asked for an option to encrypt temporary data, but adding support for encrypting temporary data could still be a useful enhancement.
Please take the time to vote for the option most suitable for your own use cases, and share your opinion about the topic in general.
5 votes ·
Beta Was this translation helpful? Give feedback.
All reactions