TiddlerEncryptionPlugin is not quite what you are looking for, but,
may do the job.

http://www.remotely-helpful.com/TiddlyWiki/TiddlerEncryptionPlugin.html

The Tiddler contents is encrypted and tagged with a 'prompt'. You
enter the password that corresponds to the prompt and the tiddler
contents are decrypted.
If a tiddler has a different prompt, then you can give it a different
password.
Settings include not caching the password, so every tiddler you want
to see, you have to re-enter the password.
Tiddlers are automatically encrypted, and a password prompted for, if
you create a new tiddler with a prompt that has not had a password
entered before.
Basically, you simply give different prompts to different tiddlers and
distribute the passwords appropriately. If someone does not have the
password to a prompt, they cannot read the contents.
Feel free to contact me for further details.

...Lyall

Lyall at remotelyhelpful dot com

On May 17, 3:03 am, "Mark S." <[email protected]> wrote:
> GPG wants to flip around 1024 bit numbers. I suspect that is a bit
> much to ask from a scripting language like js. And why the existing
> encryption plugin uses a much simpler algorithm.
>
> Maybe something like TiddlyWeb could access gpg code on the local
> server to do the heavy work of converting RSA and IDEA encrypted text
> into plain text. But then how it would it send it? Maybe via a 128 bit
> https/ssl channel.
>
> If you're not guarding state secrets, why not just use the existing
> encryption plugin, and send the password to everyone that you want to
> access it? PGP/GPG is neat, but its most useful when you don't have a
> secure method of distributing password keys. If you have a method,
> then maybe its just an extra layer of complexity.
>
> -- Mark
>
> On May 15, 1:22 am, 9600 <[email protected]> wrote:
>
> > Hello,
>
> > I'd like to be able to store root passwords and the like in a
> > TiddlyWiki, and access to be controlled via GnuPG (PGP) keys. So end
> > users would store their private keys locally and the sensitive data
> > would be encrypted using the public keys of only those users you want
> > to provide access to.
>
> > Ideally you would be able to cache all the public keys in the
> > TiddlyWiki and thus when encrypting be able to simply select which
> > users to give access to. However, you would of course not want to have
> > the user's private key persisted in the TiddlyWiki, and just have this
> > loaded when needed and remove from memory afterwards.
>
> > Whether the data is an element of a tiddler or a entire tiddler
> > probably doesn't matter.
>
> > Other desires include:
>
> > - Being protected from scripting attacks and malicious plug-ins that
> > would result in the private key being compromised.
> > - Being suitable for deploying on top of TiddlyWeb.
>
> > Does anyone know if any work has been done to support this sort of use
> > case?
>
> > Cheers,
>
> > Andrew
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"TiddlyWiki" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/TiddlyWiki?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to