PI> If someone was ambitious enough they could attach a debugger to your
PI> application, extract key used to decrypt the database and obtain all
PI> the sensitive information you have. So if you really want to protect
PI> your database against those who is able to attach a debugger you
PI> shouldn't use SQLite.
PI> Pavel

This is the key. It depends on how secure you need it to be. If it
really needs to be secure then having the encryption key in memory or
in the application means it's not all that secure. This isn't a
limitation of SQLite though. It's a limitation of running a program on
someone else's hardware.

You could encrypt the SQL and then decrypt right before usage then
clear it from memory. Won't stop a debugger but, it will stop them
from pulling the strings out of your application directly.

_______________________________________________
sqlite-users mailing list
sqlite-users@sqlite.org
http://sqlite.org:8080/cgi-bin/mailman/listinfo/sqlite-users

Reply via email to