0
Is Ninox database password protection intentionally easy to bypass locally?
I was surprised to find that in a local Ninox database file, removing a string like
s:{"version":"PROTECTED.1","hash":...}
seems to remove the password protection.
This was unexpected, as I assumed the protection involved real encryption and would be relatively secure.
I also noticed this doesn’t seem to work in the cloud version.
Is this behavior intentional? Is local password protection only meant as a basic access restriction rather than real security?
Thanks!
Reply
Content aside
- 2 days agoLast active
- 20Views
-
1
Following
