On Monday 08 May 2017 17:35:59 Antonis Christofides wrote:
> > Unfortunately, that doesn't prevent theft at runtime, which is the
> > primary case for encrypting "documents". I used to do something
> > like this with svn passwords, using a file-backed mdconfig store
> > and geli.
> 
> But during runtime, Django has access to the unencrypted database
> (otherwise it wouldn't be able to work). So any attacker who has
> managed to compromise Django

You assume Django is compromised. I don't. Could be the webserver. Could be 
some other 
application that exposes the file.

Another use case for encrypting the sqlite database is that it doesn't have 
authentication, so 
you cannot pass on login credentials to the database like you do with a "real" 
database system. 
This is one way for embedded systems to personalize devices without having to 
manage 
another server component.

With IoT security being under a microscope these days, I can see the potential. 
And from 
experience, Django runs fine on a Raspberry Pi and is an easy way to provide a 
user interface 
that is accessible from anywhere.

-- 
Melvyn Sopacua

-- 
You received this message because you are subscribed to the Google Groups 
"Django users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to django-users+unsubscr...@googlegroups.com.
To post to this group, send email to django-users@googlegroups.com.
Visit this group at https://groups.google.com/group/django-users.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/django-users/27229024.NH8PPNG8h5%40devstation.
For more options, visit https://groups.google.com/d/optout.

Reply via email to