Thank you all for the replies. So, essentially any TW content is up for 
grabs as long as the TW is loaded in the browser, whether encrypted or not. 
I reckon that the stationary TW file residing on HDD somewhere is 
relatively safe, if encrypted (password protected). 

Again, thank you for the valuable information & technical insights.

Regards,
Hubert

On Tuesday, 3 September 2019 09:56:57 UTC+1, PMario wrote:
>
> On Monday, September 2, 2019 at 4:13:29 PM UTC+2, Hubert wrote:
> ...
>
>> However, since the html source appears to remain unchanged once 
>> encryption password has been provided and tiddlers were decrypted, I can 
>> only assume that all now-decrypted tiddler content has been loaded as 
>> plaintext into RAM or some kind of browser storage, is this correct?
>>
>
> It is RAM. It is a structure that is called $tw.wiki .. we also call it 
> "the store" or "wiki store". ... This store can be accessed with eg: 
> $tw.wiki.getTiddler("HelloThere")
> The returned object is "plain text". 
>
> There is no persistent browser storage involved. ... So if the TW tab is 
> closed and reopened, there are no plain text artefacts on the hard drive. 
>  
>
>> My second question then is, how vulnerable would this content be to any 
>> form of hijacking/extracting as plaintext once TiddlyWiki decryption 
>> password has been provided?
>>
>
> As I wrote above. If the user has access to your browser, with decrypted 
> content, it would be as easy as typing F12 which opens the developer 
> terminal. Enter the string $tw.wiki.getTiddler("HelloThere") and you'll 
> get some output. 
>
> That's exactly the same problem, you'd have with any other software, that 
> displays unencrypted content, if you have access to the terminal. 
>
> It would be possible to create a TW plugin, that detects, if the TW tab is 
> visible. If it is hidden, it could remove "the store" from the TW internal 
> memory. ... Which doesn't mean, that the browser will forget it 
> immediately. But it would make it much harder. 
>
> The core encryption/decryption function is a "all or nothing" approach, 
> because it is convenient. There is a plugin 
> <https://tiddlywiki.com/#%22Encrypt%20single%20tiddler%20plugin%22%20by%20Danielo%20Rodriguez>,
>  
> that lets you encrypt / decrypt single tiddlers. 
>
> As you can see, we can do a lot with plugins. So it really depends on your 
> requirements. ... 
>
> Just to be sure: There are some researchers out there, that state that: 
> "encryption in the browser will never be secure". 
>
> have fun!
> mario
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"TiddlyWiki" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/tiddlywiki/77038932-813e-4330-ae34-dcfc8138b188%40googlegroups.com.

Reply via email to