<table><tr><td style="">ngraham added a comment.
</td></tr></table><br /><div><div><blockquote style="border-left: 3px solid #8C98B8;
color: #6B748C;
font-style: italic;
margin: 4px 0 12px 0;
padding: 8px 12px;
background-color: #F8F9FC;">
<div style="font-style: normal;
padding-bottom: 4px;">In <a href="https://phabricator.kde.org/T8066#161715" style="background-color: #e7e7e7;
border-color: #e7e7e7;
border-radius: 3px;
padding: 0 4px;
font-weight: bold;
color: black;text-decoration: none;">T8066#161715</a>, <a href="https://phabricator.kde.org/p/bruns/" style="
border-color: #f1f7ff;
color: #19558d;
background-color: #f1f7ff;
border: 1px solid transparent;
border-radius: 3px;
font-weight: bold;
padding: 0 4px;">@bruns</a> wrote:</div>
<div style="margin: 0;
padding: 0;
border: 0;
color: rgb(107, 116, 140);"><p>As a stopgap measure blacklisting ~/Vaults is probably ok.<br />
Long term, blacklisting *all* encrypted file systems IMHO is the way to go, as this is an information leakage.<br />
Of course, if the complete home is encrypted, i.e. content and index reside in the same encrypted volume, home should still be indexed.</p></div>
</blockquote>
<p>+1, this all sounds sane to me.</p></div></div><br /><div><strong>TASK DETAIL</strong><div><a href="https://phabricator.kde.org/T8066">https://phabricator.kde.org/T8066</a></div></div><br /><div><strong>To: </strong>michaelh, ngraham<br /><strong>Cc: </strong>ngraham, smithjd, bruns, nicolasfella, ivan, plasma-devel, alexeymin, michaelh, ashaposhnikov, astippich, spoorun, abrahams<br /></div>