You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Even better, we can put the encrypted key directly into storage as our storage supports it. However, this would require rewriting all parity state/accounts to support arbitrary length keys, instead of H256.
Instead we can just slice the first 32 bytes.
Even better, we can put the encrypted key directly into storage as our storage supports it. However, this would require rewriting all parity state/accounts to support arbitrary length keys, instead of H256.
See here for current implementation.
Note: this requires a state wipe. We should do this in the same pass that we swap out mrae.
For more background, see https://oasis-labs.slack.com/archives/GAX99F0A0/p1553309277351300
The text was updated successfully, but these errors were encountered: