Platform: maximize PII protection and data safety for cloud users #20
Labels
No labels
free-tier:live
priority:backlog
priority:high
priority:medium
status:active-dev
status:alpha
status:beta
status:concept
status:design
status:launched
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: Circuit-Forge/roadmap#20
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Overview
As a privacy-first platform, we should continuously improve how user PII and sensitive data is protected across all managed cloud instances.
Current state (as of 2026-03-10)
staging.db— SQLCipher encrypted per-user ✅user.yaml,plain_text_resume.yaml, search profiles, etc. — now isolated per user in per-user config dirs, but stored as plaintext YAML ⚠️user.yamlas_raw_resume_text(up to 8000 chars of PII) ⚠️Backlog ideas
CF_SERVER_SECRET+user_id(same approach as SQLCipher key derivation)cloud_session.get_config()/cloud_session.save_config()) that transparently encrypts/decrypts YAML in cloud mode_raw_resume_textstored in user.yaml — strip after career summary is generatedContext
This came up while hardening the Peregrine cloud/menagerie instance. The per-user config dir isolation fix (PR/commit 2026-03-10) is a prerequisite for YAML encryption.