Several people asked if it would be possible to have "private" bugs, for security sensitive issues and such.
With the new identity management, we will eventually have crypto keypair associated with these identities to sign the bug editions and so on. We can leverage this and encrypt the bug operations with a multi-reader crypto scheme to limit who can read the bug.
we might need to store independently from the bugs the groups information (symmetric key K to encrypt the data, K encrypted for each user keys). Bug data is immutable so if we want to give access to someone else, it's not possible if everything is in the encrypted OperationPack.
what happen if a user key is leaked ?
It doesn't even have to be the whole bug, it can also be just a comment. If an operation is encrypted, it becomes a no-op for users that can't decrypt it, and it still works for them.
Then sensitive bugs can be shared via secured means, independently of the public bugs. Either pushing them to a private repo, encrypting it, or something else.
In my opinion making them private by marking them as such with 'metadata' will always be problematic. The main reason people want "private" bugs is because they want to treat a subset of bugs differently.
@rafasc you make a very good point about the metadata. With this scheme, even thought every actual data (title, comments, author ...) would be encrypted, there is still the knowledge that a discussion is happening. Which might or might not be acceptable.
Sorry I didn't really replied to your inputs. Both of those subjects are for now at a lower priority and those issue serve mostly as brain dump for when they get into the drawing board. My point is, I don't have an answer yet.
rafasc (rafasc) commented
And my motivation for commenting here was too keep the threads connected. So when the time comes to address this issue, the other suggestion is at least taken in consideration. :)
github-actions (github-actions) commented
This bot triages untriaged issues and PRs according to the following rules:
After 90 days of inactivity, the lifecycle/stale label is applied
After 30 days of inactivity since lifecycle/stale was applied, the issue is closed