Improve local note storage #20

Open
opened 2022-12-27 20:42:13 +03:00 by gozzy · 1 comment

Exposing raw text copies of deposit notes in the recipents local enviroment, leaves it vulnerable to adversial extraction if the enviroment is breached. Users should have the option to configure encrypting each note with a chosen public key, this could be the either the depositing address or the recieving address.

Exposing raw text copies of deposit notes in the recipents local enviroment, leaves it vulnerable to adversial extraction if the enviroment is breached. Users should have the option to configure encrypting each note with a chosen public key, this could be the either the depositing address or the recieving address.

Support to also decrypt such notes would be required on the interface if detected, which would require connecting an ethereum provider argubaly effecting anonymity from preying middleware.

Although individuals can decrypt offline or mask fingerpinting through other properiatry methods.

Support to also decrypt such notes would be required on the interface if detected, which would require connecting an ethereum provider argubaly effecting anonymity from preying middleware. Although individuals can decrypt offline or mask fingerpinting through other properiatry methods.
Sign in to join this conversation.
No Milestone
No project
No Assignees
1 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: tornadocash/classic-ui#20
No description provided.