-
If a name gets either lost or stolen (by either the private key owner being lost or the private key being compromised), it's important to convey to the world that the name is no longer under the contr…
-
I sit possible to reuse existing EC keys for pyUmbral encryption and decryption.
-
Since this tool is dealing with very sensitive data, I'd like to see more documentation details on the other security measures apart from the group password.
Eg.
* Where does my private/public ke…
myrho updated
6 years ago
-
Hi, thanks for your work on this. It's built well.
I'm wondering if there is a way to recover the mnemonic phrase from a hexadecimal string. Specifically, jsbip39.js:131 self.toSeed() generates a…
-
- [ ] Isolation of wordlists from primary export (https://github.com/bitcoinjs/bip39/issues/71)
- [ ] Remove `mnemonicToSeedHex`, remove implicit hex support, Buffer only
- [x] `safe-buffer`
- [ ] …
-
See this reddit thread:
https://www.reddit.com/r/Bitcoin/comments/6fw565/using_shamirs_secret_sharing_scheme_ssss_with/
-
Moving discussions between @cygnusv and I from Email to GitHub!
The Umbral data classes need to have a serialization format. This involves the classes:
1. `RekeyFrag`
2. `CiphertextKEM`
3. `Ci…
tuxxy updated
6 years ago
-
Hi there,
You are missing Tim Tiemens implementation in Java https://github.com/timtiemens/secretshare
Also maybe relevant this end-user application I've made https://secrets.dyne.org which can …
-
I'd like to request the ability to serialize a 64 byte BIP39 seed in hexadecimal into the corresponding BIP32 root key (xpriv). Currently, the field for the BIP39 seed does not permit user input.
-
Suggested by @jvehent.
Currently, every single master key has the capacity to fully decrypt the data key, and therefore the whole file. It would be desirable to have a way to require access to more…