Mr. (Or should I say Doctor) Waddingham! This is a really brilliant essay on 
the risk, benefits and rewards in multiple scenarios concerning the storage of 
keys. I’ve mentioned before that I came up with the idea of “poisoning” the 
encrypted data before the data was transmitted. If intercepted in transit, the 
data itself could never be decrypted without knowing how it was poisoned and 
what was needed to “cleanse” it. And that would require access to either the 
API of the device doing the corruption or the cleansing, or else someone who 
knew the method. 

By using this method, all but physical and social vectors are nullified. And 
control of those vectors is an illusion. 

Bob S 

Sent from my iPhone

> On Jun 24, 2022, at 13:22, Mark Wieder via use-livecode 
> <use-livecode@lists.runrev.com> wrote:
> 
> On 6/24/22 10:04, Mark Waddingham via use-livecode wrote:
> 
>> The only way to use these keys is from server scripts running on a server 
>> which you do your best to maintain the security of. Ideally these keys 
>> should be stored in files which are only readable by specific users - 
>> usually the web-server user which is running the backend scripts which needs 
>> to make the requests.
> 
> Or as server environment variables retrieved only by server scripts which are 
> not user-accessible.
> 
> -- 
> Mark Wieder
> ahsoftw...@gmail.com
> 
> _______________________________________________
> use-livecode mailing list
> use-livecode@lists.runrev.com
> Please visit this url to subscribe, unsubscribe and manage your subscription 
> preferences:
> http://lists.runrev.com/mailman/listinfo/use-livecode
_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to