-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reduce chances of loosing RLN credentials. #28
Reduce chances of loosing RLN credentials. #28
Comments
@staheri14 @s1fr0 please clarify:
|
Yes, it's the |
@fryorcraken for 2 and 4, the contract address and the nonce are definitive. With nonce we allow multiple registrations to the same membership contract. However, for the password, we yet did not get to an agreement. To me still it makes sense to have an app-level password to make sure the same seed (hence rln credentials) will not be derived by a malicious irrelevant application. |
|
Note that it may be more efficient (less network request) to look at the merkle tree to recover the membership id. See waku-org/nwaku#1278 (comment) |
Problem
Credentials are purely generated from entropy, meaning that if a user lose access to their key, then they lose access to their RLN membership.
Proposed Solution
A. Seed derivation from signature
M
:The signature of this message will be used to generate your RLN credentials. Ensure that this signature is only shared with the RLN dApp.
As long as the user has access to their Ethereum private key, they can regenerate their credentials.
They also need to be able to retrieve their membership id.
To do so:
B. Secure storage of credentials in cryptkey-like extension
Another strategy is to store the credentials in an extensions.
Acceptance Criteria
Note
Zerokit now supports seeded keygen: vacp2p/zerokit#56
Strategy B can be done at a later stage.
The text was updated successfully, but these errors were encountered: