Skip to content

Don't store encrypted seed entropy #1486

@mnzaki

Description

@mnzaki

Description

Don't store the seed entropy, even if encrypted (password is in OS keystore). Instead store the derived key pairs directly. This will provide for added security (phone compromise is not necessarily a seed compromise any more). It will also make #1427 trivial

Current idea is to use the persona table to store the generated keys (encrypting the privateKey of course) and DID.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions