-
How could Nillion address storing sensible information such as private keys in a secure way?. In this use case a user wants to recover a lost private key prior saved to Nillion network.
Hope this questions help us to open a conversation regarding this use case. |
Beta Was this translation helpful? Give feedback.
Replies: 8 comments 7 replies
-
Hey @eum602 I'm going to reply to each question in a different comment so that I can wait for some clarity from the team on some of them to provide the best answers! |
Beta Was this translation helpful? Give feedback.
-
Yes! Our storage technology is quantum secure and for a simple storage and retrieve workflow, we've got you covered. |
Beta Was this translation helpful? Give feedback.
-
Our current design utilizes a S3 compatible storage system and our network cluster participants for the PetNet (where your secrets are stored and compute operations happen) will initially be permissioned. Meaning that we will only connect to and work with partners that we talk to, audit, and explicitly trust. Thus, on the technical front, we will require that these partners have a highly available and absolute secure handling of their storage implementation. |
Beta Was this translation helpful? Give feedback.
-
That possibly would require collusion and coordination of a large number of cluster participants of the PetNet to form a reconstruction attack. This is something we address at first by centralizing permission authority with us (Nillion) and establishing financial and reputation stakes; among other tactics. We are still working out all these kinds of details, but we understand how important this is to get right and aim to work out issues as early as possible. |
Beta Was this translation helpful? Give feedback.
-
If enough, by percentage, of the network nodes colluded it would put all the data stored amongst them at risk of exposure. This is exactly why Nillion is decentralized so that you don't have to trust a single entity to "do the right thing all the time and never hire a nefarious black hat". We believe our strategies on how to address this very topic (ala permissioned PetNet) is an effective way to deter this kind of threat. |
Beta Was this translation helpful? Give feedback.
-
Based on the documenttion to retrieve a secret in Nillion; retrieving the blind split parts comprising a private requires a user-key (private key) and a node-key. How is this supposed to managed? How would these parameters be orchestrated between a natural person and nillion, Could you please elaborate with a recovery flow? |
Beta Was this translation helpful? Give feedback.
-
Our current design utilizes a S3 compatible storage system. The operator of the network node will be responsible for providing reliable data retrieval and the guarantee is in the tokenomics reward system that we are in the process of completing. In other words, we aim to use monetary incentive or slashing mechanisms. |
Beta Was this translation helpful? Give feedback.
-
No. Each node contains only a subset of the parts and reconstruction cannot be completed without all the parts being present as expected on all of the cluster node participants. I am gleaning that you are thinking about "what happens if a node disappears forever from the cluster and is my data lost?" - our testnet and early functional network will not have this solved but we do have this on our roadmap for mainnet. |
Beta Was this translation helpful? Give feedback.
Yes! Our storage technology is quantum secure and for a simple storage and retrieve workflow, we've got you covered.