New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
replace shared_preferences with something suitable for sensitive data #1
Comments
I would recomend Flutter Secure Storage for this, though the downside would be: wrapper for emulating and injecting for Android and iOs for tests and other things. |
@RickStanley thanks. Would you like to PR this change? |
will this helps?? |
There is a downside: Flutter Secure Storage works only on Android iOS and Linux. Windows, macOS and Web won't be supported. |
Hive is cross-platform and has strong encryption built in. Closing because #58 fixes this issue and implements hive via stash_hive. |
Look like storing sensitive data in cookies is mainly a bad practice. |
As @LightIn-death said, it is a bad practice to store sensitive data like passwords, SSN or even credit card numbers in cookies. The possibility where there are sensitive data in the cookie should not concern But there still should be an option to encrypt the data as hive already implements it. #63 will permit that by allowing the end user to chose between using requests out of the box or initializing it with an encryption key. I've reopened this issue since my previous implementation of |
shared_preferences is not the best practice for storing sensitive data. use something else
The text was updated successfully, but these errors were encountered: