Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Idea: Encrypt incoming data by default #12

Open
cabe56 opened this issue Jul 15, 2023 · 0 comments
Open

Idea: Encrypt incoming data by default #12

cabe56 opened this issue Jul 15, 2023 · 0 comments

Comments

@cabe56
Copy link

cabe56 commented Jul 15, 2023

Feel free to close this, I just thought this could be a fun project for anyone interested in playing around with Tokenizer.

Goal: Ensure your server cannot hold any sensitive data by automatically encrypting incoming fields in requests (eg credit card data).

How:

  • Inbound: Encrypt with Tokenizer public key using Cloudflare Rules and/or Workers (or any other provider that you can place in front of all your traffic)
  • Your backend just gets the tokenized value substituted inside the request body
  • Outbound: Send data though Tokenizer, values encrypted by default will be replaced in the request to your destination (eg Stripe)

Most of the work here seems unrelated to this project: configuring encryption and substitutions in the provider of your choice. I think this project is interesting bc it makes Tokenizer a replacement for a service like VGS https://www.verygoodsecurity.com/platform.

Any ideas on how to improve this or what to watch out for is someone wants to implement this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant