When i create a replication request, does it store the entire URL including USERNAME and PASSWORD in plaintext in sqlite?
Am asking only because i went thru the db and i was able to read the info straight out of it.
Isnt this unsecure?
Ok i totally forgot to mention that fact that i was referring to Android :)
Ok. Do you think you could out up a small code snippet to demonstrate this?
Precisely why I brought up the question. Securing the code is an issue which can be solved by the problems u said...but what happens is that the replication URL goes and sits in the sqlite DB as plain text. My question was how to avoid that.
That too in the case of continuous replication. Marty has suggested a method for single replication and I don't know if that's the solution for my problem but that seems to be the only one.
I still am not able to figure out how to not expose the user name password.
(Android touchdb is the env, jus to clarify)
2. If you allow for rooted devices, the only solution is to encrypt
data with information that is NOT stored on the phone. Keychain type
APIs encrypt the data with keys stored on phone.
Thank you :)
Okie :) thank you for letting us know
Can one of the main touchdb creators confirm if sqlcipher can be used successfully and integrated as mentioned on the site that is provided?