Update the identifier tag d
for user's app data event
#120
Labels
No Label
Kind/Breaking
Kind/Bug
Kind/Documentation
Kind/Enhancement
Kind/Feature
Kind/Security
Kind/Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Reviewed
Confirmed
Reviewed
Duplicate
Reviewed
Invalid
Reviewed
Won't Fix
Status
Abandoned
Status
Blocked
Status
Need More Info
No Milestone
No project
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: sigit/sigit.io#120
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Currently we are using sha256 hash of
938 + user's pubkey
for user's the identifier tagd
of user's app data event. Rather we should sign the event with938 + user's pubkey
and create_at = 0 or start of UNIX timestamp if 0 is not allowed and use the signature of that event as an identifier.Update filter for getting user's appDatato Update the identifier `d` for user's app data eventUpdate the identifier `d` for user's app data eventto Update the identifier tag `d` for user's app data events referenced this issue2024-08-22 08:19:49 +00:00
This approach wouldn't work as we would get different signatures every time we sign an event.
Following discussion with @m
The problem is not that we get the same signature (because created_at=0)
The problem is that relays will not accept an event with created_at=0
Neither do they want one signed in the future. So the idea to create a unique id that ONLY the user will know, is not so easy. Probably there is some way where there is a generic D-tag for app data, one that contains encrypted key-value pairs, one of which could be the sigit id.
Until such a spec appears, we should stick with the existing approach of using the hash of
938_$(npub)
.