0

Is Ninox database password protection intentionally easy to bypass locally?

I was surprised to find that in a local Ninox database file, removing a string like

s:{"version":"PROTECTED.1","hash":...}

seems to remove the password protection.

 

This was unexpected, as I assumed the protection involved real encryption and would be relatively secure.

 

I also noticed this doesn’t seem to work in the cloud version.

 

Is this behavior intentional? Is local password protection only meant as a basic access restriction rather than real security?

 

Thanks!

Reply

null

Content aside

  • 2 days agoLast active
  • 20Views
  • 1 Following