Some things that vim keeps can leak information. I'm curious if there would be any issues with encrypting backupdir, directory, undodir, and viminfo files?
Basically, I'm thinking that either vim could either use a per file pass based on a keyring or a global password. If this feature were on and the password / decryption failed, a non-encrypted file could be used (encrypted filetypes would be defined with an extension so having one file with an encrypted and plaintext swpfile for instance, would be sane). That or the file just isn't written/used if the feature is on and no/wrong password is present. Thoughts? PS - If I open a file that allows write for a group I'm in, I can write it and will get a swpfile with permissions for my default group. This is a part of the data leakage I'm talking about. PPS - https://github.com/jamessan/vim-gnupg does the right thing (with not saving anything externally). -- -- You received this message from the "vim_use" maillist. Do not top-post! Type your reply below the text you are replying to. For more information, visit http://www.vim.org/maillist.php --- You received this message because you are subscribed to the Google Groups "vim_use" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/groups/opt_out.
