Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

implement a secure key storage functionality for the pop-server E3 #40

Open
francis-pouatcha opened this issue Sep 12, 2023 · 3 comments · May be fixed by #176
Open

implement a secure key storage functionality for the pop-server E3 #40

francis-pouatcha opened this issue Sep 12, 2023 · 3 comments · May be fixed by #176
Assignees

Comments

@francis-pouatcha
Copy link
Member

No description provided.

@francis-pouatcha francis-pouatcha converted this from a draft issue Sep 12, 2023
@francis-pouatcha
Copy link
Member Author

Sample Implementation from popular eth server implementation:
https://github.com/paradigmxyz/reth/blob/main/bin/reth/src/args/secret_key.rs -> whereby they do nothing special.

@francis-pouatcha
Copy link
Member Author

in the context of this task, we will also have to provide some functionality on how to protect secrets in a rust server. This is a sample project that goes into that direction: https://github.com/iqlusioninc/crates/tree/main/secrecy.

I am principally interested with:

  • how to erase a secret in memory after usage
  • how to prevent a secret from being written to a log file

@Tekum-Emmanuella
Copy link
Collaborator

Please i need help to implement this ticket @Blindspot22 @Christiantyemele

@chendiblessing chendiblessing changed the title implement a secure key storage functionality for the pop-server implement a secure key storage functionality for the pop-server E3 Nov 13, 2024
@Christiantyemele Christiantyemele self-assigned this Nov 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants