Closed mustermeiszer closed 8 months ago
Sounds interesting, I feel this lacking in XCM. So may be parity working on this?
What type of signature is used? various chains use different signature schemes? should it be enum variant somewhere?
Did you saw ORML remote chains XCM helper? Does it solves you problem?
Sounds interesting, I feel this lacking in XCM. So may be parity working on this?
I don't think so. I think the current solution is to just derive secure accounts that have no privat keys on the remote chains.
Did you saw ORML remote chains XCM helper? Does it solves you problem?
Can you point me to it?
yeah, derived accounts (utility so limited to 65k of these) or https://github.com/open-web3-stack/orml-xcm-builder/blob/master/kusama/src/tinkernet_multisigs.rs
Closing as we are having remote account derivation now.
Currently, XCM does not support a way to prove ownership of an
AccountId32
via aJunction
. This leads to the need, that parachains need to trust the sender of an XCM that it has made proper checks of ownership when converting something likeinto either an
Origin
(e.g. in theInstructions::Transact
) or anAccountId
(e.g. in theAssetTransactor::*
calls).Adding both or one of the below could help here: