-
Notifications
You must be signed in to change notification settings - Fork 905
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: Improving the security of keys, state and secretes #3492
Comments
I'm not sure to understand your requests, are you asking for encrypting the database content ? On the other hand if you are asking for a secure keystore, an (encrypted) |
Otherwise yes: we now have a very weak encryption of |
Ok, I'll add a manpage and add it to install. |
@ZmnSCPxj a late reply about this, do you have an opinion on how to improve it ? |
Not sure. We could mark the entire |
In Mastering the lightning network we currently have the following quote:
The most common components of lightning wallet software include: A keystore that securely holds secrets, such as private keys.
I opened an issue on Mastering the Lightning Network: lnbook/lnbook#136
and noted the following about c-lightnig:
I thus have the feature request to improve these issues. I understand also that on the other side it seems kind of stupid as access to the machine even if the data was encrypted would probably give access to the API and allow to close channels and transfer funds. but especially those API calls could call for decryption keys.
The text was updated successfully, but these errors were encountered: