-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Don't store encrypted seed entropy #1486
Labels
Comments
@mnzaki this is something we should look at in the typeorm sdk storage stuff |
Is this even in the notion backlog? |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
Don't store the seed entropy, even if encrypted (password is in OS keystore). Instead store the derived key pairs directly. This will provide for added security (phone compromise is not necessarily a seed compromise any more). It will also make #1427 trivial
Current idea is to use the
persona
table to store the generated keys (encrypting the privateKey of course) and DID.The text was updated successfully, but these errors were encountered: