You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@fjarri suggested we store the hash of the user's constraints on-chain instead of the plaintext constraints for privacy purposes.
There are two main ways this would go:
User's store their constraints: If the user doesn't backup the constraints, they need to get their constraint key out again and set new constraints from scratch. Constraints are still revealed to validators in signing party.
Server stores the user's constraints asymmetrically encrypted - prevents the user from having to reset their constraints if they lose the preimage. Constraints are still revealed to validators in signing party.
We could still somewhat blind the active constraints by updating the on-chain hash every time we do a signing request and using a nonce in the constraint's preimage, but this requires the constraint key every time we want to send a tx.
While this would be a good way of keeping the constraints being visible on-chain, there seem to be a ton of unresolved issues in practice.
The text was updated successfully, but these errors were encountered:
@fjarri suggested we store the hash of the user's constraints on-chain instead of the plaintext constraints for privacy purposes.
There are two main ways this would go:
We could still somewhat blind the active constraints by updating the on-chain hash every time we do a signing request and using a nonce in the constraint's preimage, but this requires the constraint key every time we want to send a tx.
While this would be a good way of keeping the constraints being visible on-chain, there seem to be a ton of unresolved issues in practice.
The text was updated successfully, but these errors were encountered: