drawnSignature management #242

Closed
opened 2024-11-04 10:08:09 +00:00 by b · 2 comments
Owner

drawnSignature data is too big for relays

We should store on blossom, using the hash

  • The meta.json should contain the HASH (not the data) in the drawnSignatures section
  • When exporting (encrypted or not) we should include the signature data in the files folder in the zipped file (HASH.json)
  • Signature data should also be verified on the verify page (make sure the hash of the file is the hash in the meta.json)
  • The actual signing box should also be larger! And scaled down to the drawn box.

This would mean that file size is no longer a real concern.

In a future release we can save signature data in the user (app) data, so that it can be re-used across multiple sigits

`drawnSignature` data is too big for relays We should store on blossom, using the hash - [x] The meta.json should contain the HASH (not the data) in the `drawnSignatures` section - [x] When exporting (encrypted or not) we should include the signature data in the files folder in the zipped file (HASH.json) - [x] Signature data should also be verified on the verify page (make sure the hash of the file is the hash in the meta.json) - [x] The actual signing box should also be larger! And scaled down to the drawn box. This would mean that file size is no longer a real concern. In a *future release* we can save signature data in the user (app) data, so that it can be re-used across multiple sigits
enes was assigned by b 2024-11-04 10:08:15 +00:00
Member

When exporting (encrypted or not) we should include the signature data in the files folder in the zipped file (HASH.json)

The signature data is saved under signatures/<encrypted_hash>.json

Signature data should also be verified on the verify page (make sure the hash of the file is the hash in the meta.json)

The current implementation only throws an error if there is mismatch during hash comparison as soon as we fetch the data in fetchAndDecrypt function, there is no visual representation in the UI.

>When exporting (encrypted or not) we should include the signature data in the files folder in the zipped file (HASH.json) The signature data is saved under `signatures/<encrypted_hash>.json` >Signature data should also be verified on the verify page (make sure the hash of the file is the hash in the meta.json) The current implementation only throws an error if there is mismatch during hash comparison as soon as we fetch the data in `fetchAndDecrypt` function, there is no visual representation in the UI.
Member

Closed by #258

Closed by https://git.nostrdev.com/sigit/sigit.io/pulls/258
enes closed this issue 2024-11-29 09:01:37 +00:00
Sign in to join this conversation.
No description provided.