Some considerations when using confidential data on a Unix system.

The general idea here is to make it a bit harder to expose the plain text of an encrypted data file you are editing. This page is primarily for system administrators and application programmers.

RAM Disk

Suggested Procedure

Using a volatile file system helps minimize a lot of risks associated with editing sensitive data. It also creates a new one: an area of your file system to search for sensitive data.

vim

Suggested Procedure

less

When the environment variable LESSSECURE is set to 1, less runs in a "secure" mode. This means these features are disabled:

  • ! the shell command
  • | the pipe command
  • :e the examine command.
  • v the editing command
  • s -o log files
  • -k use of lesskey files
  • -t use of tags files
  • metacharacters in filenames, such as * filename completion (TAB, ^L)

Less can also be compiled to be permanently in "secure" mode.

Suggested Procedure

Other considerations