Issues
is:issue state:open
is:issue state:open
Search results
Is this open to key commitment exploitation? Password derived key? E2EE and MLS thoughts?
questionFurther information is requestedFurther information is requestedStatus: Open.#38聽In dwyl/phoenix-ecto-encryption-example;Explicit encryption required?
good first issueGood for newcomersGood for newcomershelp wantedExtra attention is neededExtra attention is neededquestionFurther information is requestedFurther information is requestedStatus: Open.#33聽In dwyl/phoenix-ecto-encryption-example;subsititute 256bit key
questionFurther information is requestedFurther information is requestedStatus: Open.#30聽In dwyl/phoenix-ecto-encryption-example;How to work with key rotation?
questionFurther information is requestedFurther information is requestedStatus: Open.#26聽In dwyl/phoenix-ecto-encryption-example;Environment variables loading with escaped quotes
help wantedExtra attention is neededExtra attention is neededquestionFurther information is requestedFurther information is requestedStatus: Open.#20聽In dwyl/phoenix-ecto-encryption-example;Notes on README
help wantedExtra attention is neededExtra attention is neededStatus: Open.#17聽In dwyl/phoenix-ecto-encryption-example;User Interface ?
enhancementNew feature or requestNew feature or requestStatus: Open.#10聽In dwyl/phoenix-ecto-encryption-example;Add to "Awesome Cryptography" List
enhancementNew feature or requestNew feature or requestStatus: Open.#9聽In dwyl/phoenix-ecto-encryption-example;