gritzko / swarm-ron-docs

https://gritzko.gitbooks.io/swarm-the-protocol/content/
54 stars 8 forks source link

Type parameters #11

Closed vestild closed 7 years ago

vestild commented 7 years ago

Second part of type id is used to describe access rules and required cryptography. There is nothing more about access rules and how it can be implemented. Required cryptography can vary form object to object not just type to type. So i think cryptography may be moved to noops and access rules may be just removed from protocol.