Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

improve handling of variables which contain sensitive data #2

Open
equinox0815 opened this issue May 16, 2016 · 0 comments
Open

improve handling of variables which contain sensitive data #2

equinox0815 opened this issue May 16, 2016 · 0 comments

Comments

@equinox0815
Copy link
Member

It would be nice to protect variables like passwords and other sensitive data i.e. by clearing the memory before returning it to the kernel. Sadly this is quite complicated with go as it is not possible to know for sure if there are any copies of the variable lying around in memory.
It would be great to at least use syscall.Mlockall(syscall.MCL_FUTURE) but after adding that the app panics... why is this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant