git ssb

1+

kieran / horcrux-schemas-and-thoughts



Commit 601fabee75364c929bc500133c5535fb70a1838e

participants = trustees

Kieran committed on 3/22/2018, 6:15:28 PM
Parent: 77cc88e93406723a3e5a75c81ec5ed4225471eee

Files changed

README.mdchanged
schemas/secret.jsonchanged
README.mdView
@@ -31,22 +31,22 @@
3131 - Each receives a [`secret_invite`](./schemas/invite.json) that references the rootId
3232
3333 _Therefore_
3434 - Abaddon is not restricted to just sharding his SSB key, he can shard anything he likes.
35-- Abaddon can still send out more invitations if he likes.
35 +- Abaddon can send out more invitations.
3636
3737 All of Abaddon's different secret sharing `root` events can be summoned using:
3838
3939 ```javascript
40-api.secrets.root.get()
41-api.secrets.root.stream(callback)
40 +api.secrets.root.get(callback)
41 +api.secrets.root.stream()
4242 ```
4343
4444 Invites can be viewed through the API and a FlumeView... something along the lines of:
4545
4646 ```
47-api.secrets.invites.get(rootId)
48-api.secrets.invites.stream(rootId, callback)
47 +api.secrets.invites.get(rootId, callback)
48 +api.secrets.invites.stream(rootId)
4949 ```
5050
5151 ### 2. Responses
5252
@@ -57,10 +57,10 @@
5757 - A response writes a [`secret_response`](./schemas/response.json) that indicates whether they accepted the invite or not
5858 - References the rootId so can be easily filtered through the API / a FlumeView
5959
6060 ```
61-api.secrets.responses.get(rootId)
62-api.secrets.responses.stream(rootId, callback)
61 +api.secrets.responses.get(rootId, callback)
62 +api.secrets.responses.stream(rootId)
6363 ```
6464
6565 ### 3. Trustees
6666
@@ -88,10 +88,10 @@
8888 - If Abaddon enabled it, those within that group of final cosigners can now see who eachother are.
8989 - Immediately triggers the [Secrets event](#4-secrets)
9090
9191 ```
92-api.secrets.trustees.get(rootId)
93-api.secrets.trustees.stream(rootId, callback)
92 +api.secrets.trustees.get(rootId, callback)
93 +api.secrets.trustees.stream(rootId)
9494 ```
9595
9696 **Questions**
9797 * Does having a secretive or non-secretive sharding require two different types of event? Or is it just a boolean flag? Needs clarification as it depends how the data is scuttled...
@@ -102,13 +102,13 @@
102102 **What does this do?**
103103 - Each trustee receives a shard of Abaddon's soul.
104104
105105 ```
106-api.secrets.pieces.get(rootId)
107-api.secrets.pieces.stream(rootId, callback)
106 +api.secrets.pieces.get(rootId, callback)
107 +api.secrets.pieces.stream(rootId)
108108 ```
109109
110-// Needs more thought... Should the trustees know the rootId? Do they need to?
110 +// Needs more thought... Should the trustees know the root? Do they need to?
111111
112112
113113 ## Note:
114114 - `secret_invite` and `secret_response` looks a lot like Patchbay's `ssb-chess`: `chess_invite` and `chess_accept`.
schemas/secret.jsonView
@@ -32,6 +32,6 @@
3232
3333 // Private messages can be decrypted and therefore the secret can be revealed
3434 // at any point because the sharer still has the shards...
3535
36-// Encrypt with the public key of the trustee, they become the only one to can decrypt it
36 +// Sign with the public key of the trustee, they become the only one to can view it
3737 // Secret shard is no longer compromised to the author of the secret sharing process...

Built with git-ssb-web