[feature request] remote encrypted volumes #19
Labels
No Label
bug
duplicate
enhancement
help wanted
invalid
question
wontfix
No Milestone
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: hardcoresushi/DroidFS#19
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
I love droidfs. However, It would be very nice if encrypted files could be stored in a remote (custom or public) server.
protocol would be sftp, webdav, ftp or another?
Ideally it would keep compatibility with gocryptfs, so data could be accessed from android or desktop machines.
From what I've read gocryptfs was modified to change its backend file provider.
I don't know much about android content providers, but it seems that it is possible to access a "remote content provider" like google drive or others. Unfortunately, they are not listed when I create a volume.
If android SAF can't do the job, what about using a specific library to access files remotely (jsch, or any other)?
As explained in the README, this is not possible. This is because gocryptfs and cryfs are programs designed to access the encrypted volume via direct file system calls. The only way to open remote volumes would be to simulate their local presence via FUSE or directly in the kernel. Unfortunately, these methods require root access on Android. As a workaround, you can store the encrypted volume locally and synchronize it on a remote server using an external application such as Nextcloud.
weren't libgocryptfs modified to access volume files through api calls?
I've seen cppcryptfs written in c++. Maybe it is more hackable?
https://github.com/bailey27/cppcryptfs/tree/master/libcppcryptfs/file
There are actually two sides to an encryption program like gocryptfs. The decrypted/plaintext side has been modified to be accessible via function calls, but the encrypted/ciphertext side has not been touched. As a result, it expects the encrypted volume to be stored on the file system.
It would take at least an equivalent amount of work to also modify the encrypted part so that it works with callbacks. If you have time, you create a PR for this.