For demoing - In finished product, this should be done using IDbox.
USE SECURITY!
Preferably JWT, but at the least, IP whitelist or password check.
-this endpoint will be open to the world, even on localhost.
The results will not look like the IDbox blockchain in any case, so we can use any data structure and means of storage, if the dummy isIdBoxregistered() #18 matches the structure.
It is worth developing a hashing mechanism so that phone numbers are not discernable from the blockchain (though this is probably impossible is we keep the functionality of being able to search by ethAddress).
For demoing - In finished product, this should be done using IDbox.
USE SECURITY!
Preferably JWT, but at the least, IP whitelist or password check. -this endpoint will be open to the world, even on localhost.
The results will not look like the IDbox blockchain in any case, so we can use any data structure and means of storage, if the dummy
isIdBoxregistered()
#18 matches the structure.It is worth developing a hashing mechanism so that phone numbers are not discernable from the blockchain (though this is probably impossible is we keep the functionality of being able to search by ethAddress).