-
Instead of providing static paths resolving to secrets/keys for Crypt4gh, it should point to an endpoint that resolves to a key management service/server (HSM, HTTP endpoint, GitHub `user.key`, etc...…
-
Relevant high level read about it:
https://www.ga4gh.org/news/crypt4gh-a-secure-method-for-sharing-human-genetic-data/
And the actual spec for this enhancement:
https://samtools.github.io/hts…
-
**Problem**
[Crypt4GH](https://www.ga4gh.org/news_item/crypt4gh-a-secure-method-for-sharing-human-genetic-data/) is a file format developed by GA4GH that allows sensitive genomic data to remain encry…
-
Add a standard set of test data (encrypted and unencrypted, with keys) to enable a new implementation to be validated.
-
Two ideas to improve Crypt4GH v1
(1) The original Crypt4GH standard validates the content of a file using by using MACs (message authentication codes) for each block of the file. This ensures that …
-
Following the example of [proTES](https://github.com/elixir-cloud-aai/protes), it would be useful to have a plugin/middleware/hooks system to provide additional functionality to DRS-filer, or to modif…
-
## Problem
There are situations where managers of GA4GH API products deem certain functionalities "nice to have", but feel that they may not be necessary for all implementations or that they would …
-
**Is your feature request related to a problem? Please describe.**
I'd like to incorporate this module on IGV desktop and the upstream maintainers might not accept the PR unless the .jar is publicl…
-
The Crypt4GH encrypted file format standard is currently part of the hts-specs repo, where it lives next to the SAM, BAM, CRAM, VCF, BED file format standards: https://github.com/samtools/hts-specs. T…
-
There are instances where using a FUSE is useful/essential for the completion of a TES task. For example, for tasks that use crypt4gh-encrypted files, using [crypt4ghfs](https://github.com/EGA-archive…