Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support zeroization / clearing of secrets from memory #130

Open
brentstone opened this issue Aug 20, 2022 · 0 comments
Open

Support zeroization / clearing of secrets from memory #130

brentstone opened this issue Aug 20, 2022 · 0 comments

Comments

@brentstone
Copy link

brentstone commented Aug 20, 2022

The Anoma protocol is supporting the use of secp256k1 keys in namada and is implementing the zeroization / clearing of secret key data from memory upon drop.

We currently have a branch in our fork of this repo to provide this support. In general, our branch rolls back some changes in #56 and adds some extra functionality that we use for tests.

Our branch implements a minimal set of changes in order to accomplish our zeroization goals, notably removing the Copy trait from relevant structs. We also note that it seems that the Scalar::clear method is useless when Copy is derived for Scalar.

Ideally, we would like full zeroization support in this upstream repo, but at minimum we would like to at least have a branch with this support here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant