Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support sharing encrypted realms across processes #1693

Closed
jpsim opened this issue Mar 26, 2015 · 24 comments
Closed

Support sharing encrypted realms across processes #1693

jpsim opened this issue Mar 26, 2015 · 24 comments
Labels
Blocked This issue is blocked by another issue Pipeline-Idea-Backlog T-Enhancement

Comments

@jpsim
Copy link
Contributor

jpsim commented Mar 26, 2015

No description provided.

@asjesset
Copy link

Any progress on this? We are wanting to make an iMessage/home screen extension and need this functionality.

@hdoria
Copy link

hdoria commented Feb 3, 2017

Any progress on this?

@beseder42
Copy link

We are also waiting for this! What it the time horizon to see this in a release?

@jbouaziz
Copy link

We also need that functionality, were you able to make it work?

@emlynmac
Copy link

emlynmac commented Jan 8, 2018

I'm keen to get this functionality too!

@jongarate
Copy link

This is a major pain in the ass these days. Would be SO welcome.

@cagricolak
Copy link

nowadays the problem still continues, 2019. thanks money.

@thecoolwinter
Copy link

Really need this functionality, would appreciate an update soon!

@cguzmanceti
Copy link

Hi. Any progress with this issue?? I need access to encrypted realm DB from a notification service extension, but I cann't thank you this issue 😕. Is any release planned that includes the correction of this issue? Thank you so much!

@bmunkholm
Copy link
Contributor

Hi @cguzmanceti,
Unfortunately, this is not one of the features that we are prioritizing near term. You can see our current priorities here.

@cagricolak
Copy link

5 years! what happened !

@cguzmanceti
Copy link

Hi @cagricolak ,
What happening???

@caravaneer404
Copy link

I still waiting 🐸

@XabierGoros
Copy link

It would be great to have this feature to be honest.

@yxzhaoo
Copy link

yxzhaoo commented Jun 11, 2020

Hi guys, is there any work around for this?

@thecoolwinter
Copy link

This feature is more relevant now with Widgets on Apple devices, and not being able to access encrypted realms from them. Would be awesome to have.

@si-hartmann
Copy link

This is now a dramatic show stopper as all(!) app data can now be accessed when an app is installed on a Silicon Mac. Apps can even be installed and used on a M1 Mac without(!) installing them from the Apple App Store. This means that any data that is not encrypted can be read and exported from any app! That is a huge security vulnerability.

Are there any plans to get this feature implemented after 5,5 years?

@leemaguire
Copy link
Contributor

@si-hartmann what you are saying does not look related to multiprocess support, but rather the sandboxing mechanism that iOS uses. Could you clarify your use case?

Also relying on iOS sandboxing for security is not recommended, as jailbreaking & side loading apps with system integrity protection turned off (on an M1 Mac) will let anyone view the filesystem of the app.

@si-hartmann
Copy link

@leemaguire Total agree with your second paragraph about security. But: Not being able to use encrypted realms in extensions forces apps to either use unencrypted realms or to use field level encryption - a big step and probably not down often.

Or we do not use extensions on iOS. But do you expect your iOS developers to not provide any iOS extension? The eco system does not work like that. Apple is relaying heavily on extensions for a nice UX. So it is Realm, that does not provide the necessary realm level encryption for developing these extensions in a secure way. All tough technical being possible now.

Sure jailbreaking was always a possible attack against iOS sandboxing. But now everybody(!) can load any app on the M1 Mac and then read (and edit!!) all data that the app uses. No jailbreak or anything else needed. I guess this security issue will become visible and huge soon. Should be addressed very soon!

@XabierGoros
Copy link

Also relying on iOS sandboxing for security is not recommended, as jailbreaking & side loading apps with system integrity protection turned off (on an M1 Mac) will let anyone view the filesystem of the app.

That's absolutely correct @leemaguire, and that's the main reason of why we need this feature to be developed ASAP.

@gixdev
Copy link

gixdev commented Apr 27, 2021

@bmunkholm Any progress? We need it badly :(

@RomainPct
Copy link

Still no news on the topic ? There is no clean workaround to use an encrypted realm in an iOS extension as we can't be sure to kill the other processes in app.

  • Will it be part of a future release ?
  • Is there any known work around to solve it while waiting for encrypted realm support across processes ?

@XabierGoros
Copy link

Should this issue be closed since the following change was merged? realm/realm-core#6304
It would be nice to know from which version on this change is available.

@tgoyne
Copy link
Member

tgoyne commented May 16, 2023

Yes, this was released in 10.38.0.

@tgoyne tgoyne closed this as completed May 16, 2023
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Mar 14, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Blocked This issue is blocked by another issue Pipeline-Idea-Backlog T-Enhancement
Projects
None yet
Development

No branches or pull requests