-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Decide on multi-user strategy for workstation access #145
Comments
Recapping the discussion from today's engineering meeting, please add/correct/clarify as needed:
|
Per discussion at the engineering meeting today: Based on the assessment in #153, we're comfortable moving forward with a "kiosk-style" multi-user setup until such a point that any per-user security domains are introduced. Features that would require per-user security domains include secure journalist-to-journalist or journalist-to-source messaging using per-user private keys, or protected per-user notepads. We're unlikely to introduce those features until after the beta, and they certainly will not be included in the alpha. I'll still file an issue for evaluating performance of Qubes running as a live USB operating system. Live USB seems like the most realistic option for per-user provisioning in smaller organizations. |
From what I'm able to determine, we've not explicitly stated our approach to making the SecureDrop Workstation accessible to multiple users within a news organization.
We could, for now, settle on a 1 user 1 workstation restriction for purposes of the 0.1alpha. However, such an approach is likely not workable for smaller news orgs (cost-prohibitive), and carries its own security risks for larger ones. So at minimum I think we need to have a better answer in the long run.
What are the downsides of having multiple users share a single workstation? In such a scenario, how do we want to handle "offline mode" in the client, considering that the client might retain some information on a per-user basis (settings, various counters and flags, etc.)? What other risks would we need to manage?
(Of note, Qubes is not a multi-user OS, so this would likely only be workable if we consider that all users using the workstation have and always will have the same access to files on the filesystem.)
The text was updated successfully, but these errors were encountered: