How to implement Keepass like application





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ height:90px;width:728px;box-sizing:border-box;
}







0















I'd like to ask how exactly Keepass and alike application's security is done. I would like to write something like that for my own. I guess the security of Keepass is pretty high, but still if their code will send the DB somewhere I would not know. I'm getting little paranoic and like to understand the security beneath.




  • What database does they use under the hood, proprietally or some SQL Lite like?

  • sooner or later the database must be decrypted how secure is it? I guess it depends on the language used security, OS security. Do they store decrypted DB in memory or EFS?

  • do they decrypt the whole DB or only needed items?

  • are there any other approaches for entries security with other tools i.e. cherrytree allows for encrypted XML (I guess the same issues apply to them decrypting the XML for editor to use)?










share|improve this question























  • Does this help - crypto.stackexchange.com/a/64208/62426

    – Saptarshi Basu
    Nov 22 '18 at 9:22













  • KeePass is open source. Get the source code and read it to answer all your questions.

    – James K Polk
    Nov 22 '18 at 13:56











  • Will try for sure. The question mention Keepass as an example. What are the caveats to watch for when coding such application. Copy paste from Keepass code without knowing what are requirements for security of those apps in general could be bad solution.

    – Zveratko
    Nov 22 '18 at 15:04


















0















I'd like to ask how exactly Keepass and alike application's security is done. I would like to write something like that for my own. I guess the security of Keepass is pretty high, but still if their code will send the DB somewhere I would not know. I'm getting little paranoic and like to understand the security beneath.




  • What database does they use under the hood, proprietally or some SQL Lite like?

  • sooner or later the database must be decrypted how secure is it? I guess it depends on the language used security, OS security. Do they store decrypted DB in memory or EFS?

  • do they decrypt the whole DB or only needed items?

  • are there any other approaches for entries security with other tools i.e. cherrytree allows for encrypted XML (I guess the same issues apply to them decrypting the XML for editor to use)?










share|improve this question























  • Does this help - crypto.stackexchange.com/a/64208/62426

    – Saptarshi Basu
    Nov 22 '18 at 9:22













  • KeePass is open source. Get the source code and read it to answer all your questions.

    – James K Polk
    Nov 22 '18 at 13:56











  • Will try for sure. The question mention Keepass as an example. What are the caveats to watch for when coding such application. Copy paste from Keepass code without knowing what are requirements for security of those apps in general could be bad solution.

    – Zveratko
    Nov 22 '18 at 15:04














0












0








0








I'd like to ask how exactly Keepass and alike application's security is done. I would like to write something like that for my own. I guess the security of Keepass is pretty high, but still if their code will send the DB somewhere I would not know. I'm getting little paranoic and like to understand the security beneath.




  • What database does they use under the hood, proprietally or some SQL Lite like?

  • sooner or later the database must be decrypted how secure is it? I guess it depends on the language used security, OS security. Do they store decrypted DB in memory or EFS?

  • do they decrypt the whole DB or only needed items?

  • are there any other approaches for entries security with other tools i.e. cherrytree allows for encrypted XML (I guess the same issues apply to them decrypting the XML for editor to use)?










share|improve this question














I'd like to ask how exactly Keepass and alike application's security is done. I would like to write something like that for my own. I guess the security of Keepass is pretty high, but still if their code will send the DB somewhere I would not know. I'm getting little paranoic and like to understand the security beneath.




  • What database does they use under the hood, proprietally or some SQL Lite like?

  • sooner or later the database must be decrypted how secure is it? I guess it depends on the language used security, OS security. Do they store decrypted DB in memory or EFS?

  • do they decrypt the whole DB or only needed items?

  • are there any other approaches for entries security with other tools i.e. cherrytree allows for encrypted XML (I guess the same issues apply to them decrypting the XML for editor to use)?







security encryption secure-coding key-management






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Nov 22 '18 at 7:40









ZveratkoZveratko

7331443




7331443













  • Does this help - crypto.stackexchange.com/a/64208/62426

    – Saptarshi Basu
    Nov 22 '18 at 9:22













  • KeePass is open source. Get the source code and read it to answer all your questions.

    – James K Polk
    Nov 22 '18 at 13:56











  • Will try for sure. The question mention Keepass as an example. What are the caveats to watch for when coding such application. Copy paste from Keepass code without knowing what are requirements for security of those apps in general could be bad solution.

    – Zveratko
    Nov 22 '18 at 15:04



















  • Does this help - crypto.stackexchange.com/a/64208/62426

    – Saptarshi Basu
    Nov 22 '18 at 9:22













  • KeePass is open source. Get the source code and read it to answer all your questions.

    – James K Polk
    Nov 22 '18 at 13:56











  • Will try for sure. The question mention Keepass as an example. What are the caveats to watch for when coding such application. Copy paste from Keepass code without knowing what are requirements for security of those apps in general could be bad solution.

    – Zveratko
    Nov 22 '18 at 15:04

















Does this help - crypto.stackexchange.com/a/64208/62426

– Saptarshi Basu
Nov 22 '18 at 9:22







Does this help - crypto.stackexchange.com/a/64208/62426

– Saptarshi Basu
Nov 22 '18 at 9:22















KeePass is open source. Get the source code and read it to answer all your questions.

– James K Polk
Nov 22 '18 at 13:56





KeePass is open source. Get the source code and read it to answer all your questions.

– James K Polk
Nov 22 '18 at 13:56













Will try for sure. The question mention Keepass as an example. What are the caveats to watch for when coding such application. Copy paste from Keepass code without knowing what are requirements for security of those apps in general could be bad solution.

– Zveratko
Nov 22 '18 at 15:04





Will try for sure. The question mention Keepass as an example. What are the caveats to watch for when coding such application. Copy paste from Keepass code without knowing what are requirements for security of those apps in general could be bad solution.

– Zveratko
Nov 22 '18 at 15:04












0






active

oldest

votes












Your Answer






StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");

StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53426014%2fhow-to-implement-keepass-like-application%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























0






active

oldest

votes








0






active

oldest

votes









active

oldest

votes






active

oldest

votes
















draft saved

draft discarded




















































Thanks for contributing an answer to Stack Overflow!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53426014%2fhow-to-implement-keepass-like-application%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

鏡平學校

ꓛꓣだゔៀៅຸ໢ທຮ໕໒ ,ໂ'໥໓າ໼ឨឲ៵៭ៈゎゔit''䖳𥁄卿' ☨₤₨こゎもょの;ꜹꟚꞖꞵꟅꞛေၦေɯ,ɨɡ𛃵𛁹ޝ޳ޠ޾,ޤޒޯ޾𫝒𫠁သ𛅤チョ'サノބޘދ𛁐ᶿᶇᶀᶋᶠ㨑㽹⻮ꧬ꧹؍۩وَؠ㇕㇃㇪ ㇦㇋㇋ṜẰᵡᴠ 軌ᵕ搜۳ٰޗޮ޷ސޯ𫖾𫅀ल, ꙭ꙰ꚅꙁꚊꞻꝔ꟠Ꝭㄤﺟޱސꧨꧼ꧴ꧯꧽ꧲ꧯ'⽹⽭⾁⿞⼳⽋២៩ញណើꩯꩤ꩸ꩮᶻᶺᶧᶂ𫳲𫪭𬸄𫵰𬖩𬫣𬊉ၲ𛅬㕦䬺𫝌𫝼,,𫟖𫞽ហៅ஫㆔ాఆఅꙒꚞꙍ,Ꙟ꙱エ ,ポテ,フࢰࢯ𫟠𫞶 𫝤𫟠ﺕﹱﻜﻣ𪵕𪭸𪻆𪾩𫔷ġ,ŧآꞪ꟥,ꞔꝻ♚☹⛵𛀌ꬷꭞȄƁƪƬșƦǙǗdžƝǯǧⱦⱰꓕꓢႋ神 ဴ၀க௭எ௫ឫោ ' េㇷㇴㇼ神ㇸㇲㇽㇴㇼㇻㇸ'ㇸㇿㇸㇹㇰㆣꓚꓤ₡₧ ㄨㄟ㄂ㄖㄎ໗ツڒذ₶।ऩछएोञयूटक़कयँृी,冬'𛅢𛅥ㇱㇵㇶ𥄥𦒽𠣧𠊓𧢖𥞘𩔋цѰㄠſtʯʭɿʆʗʍʩɷɛ,əʏダヵㄐㄘR{gỚṖḺờṠṫảḙḭᴮᵏᴘᵀᵷᵕᴜᴏᵾq﮲ﲿﴽﭙ軌ﰬﶚﶧ﫲Ҝжюїкӈㇴffצּ﬘﭅﬈軌'ffistfflſtffतभफɳɰʊɲʎ𛁱𛁖𛁮𛀉 𛂯𛀞నఋŀŲ 𫟲𫠖𫞺ຆຆ ໹້໕໗ๆทԊꧢꧠ꧰ꓱ⿝⼑ŎḬẃẖỐẅ ,ờỰỈỗﮊDžȩꭏꭎꬻ꭮ꬿꭖꭥꭅ㇭神 ⾈ꓵꓑ⺄㄄ㄪㄙㄅㄇstA۵䞽ॶ𫞑𫝄㇉㇇゜軌𩜛𩳠Jﻺ‚Üမ႕ႌႊၐၸဓၞၞၡ៸wyvtᶎᶪᶹစဎ꣡꣰꣢꣤ٗ؋لㇳㇾㇻㇱ㆐㆔,,㆟Ⱶヤマފ޼ޝަݿݞݠݷݐ',ݘ,ݪݙݵ𬝉𬜁𫝨𫞘くせぉて¼óû×ó£…𛅑הㄙくԗԀ5606神45,神796'𪤻𫞧ꓐ㄁ㄘɥɺꓵꓲ3''7034׉ⱦⱠˆ“𫝋ȍ,ꩲ軌꩷ꩶꩧꩫఞ۔فڱێظペサ神ナᴦᵑ47 9238їﻂ䐊䔉㠸﬎ffiﬣ,לּᴷᴦᵛᵽ,ᴨᵤ ᵸᵥᴗᵈꚏꚉꚟ⻆rtǟƴ𬎎

Why https connections are so slow when debugging (stepping over) in Java?