-
Nomad 1.7 uses a root encryption key to encrypt Variables at rest and a root signing key to sign Workload Identities.
These root keys should be rotated automatically using the following logic:
1…
-
I've attempted to flash an updated config with a BLE sensor and have had some issues so I'm trying to revert back to the standard configuration. However I'm continuing to have a problem. Can you ple…
-
We cannot prevent MEV on external TXs. If it sits in BTC for 20 minutes, anyone can frontun you. We can prevent MEV for pure-Substrate TXs with threshold encryption. Crypto2022 had the following paper…
-
Hi frens,
over the last couple of weeks, I have been looking into various ways to enable scientists to store sensitive information in an encrypted but decentralized fashion.
As a community we ta…
-
# Problem
1. Users must manually manage keys to create and retrieve encrypted requests.
2. We want to provide a good UX (low number of clicks). We DON'T want users to click to decrypt each request.
…
-
Hello, I have two questions concerning FedML-HE:
My first question is about the **Threshold-Key Management** protocol that you presented in the Appendix of the paper. You mentioned that the partic…
-
Please let me know if Pyfhel support Batching Encode and Bootstrapping?
Thank you so much.
-
### The problem
one of my D1 Mini can still do OTA updates and is pingable over mDNS and IP, but refuses to go online in both ESPHome as in HA.
I changed the way ESPHome checks if devices are onli…
-
The current plan is to do complete rewrite of the lightning module code by creating a new module instead of updating the legacy code.
- [x] Implement threshold point encryption based on BLS cryptogra…
-
Notes from today's experiments:
1. It's possible to add/remove members with share encryption keys in public recovery
2. That's because it is possible to re-key and re-share the recovery ledger sec…