sakia issueshttps://git.duniter.org/clients/python/sakia/-/issues2018-09-05T11:56:51+02:00https://git.duniter.org/clients/python/sakia/-/issues/639WoT view : wotex suggestion2018-09-05T11:56:51+02:00insoWoT view : wotex suggestion*Created by: galuel*
I suggest to make Sakia a client without graphical view like we have in WoT view right now, but better to propose the view in the Wotex style, in plain text view, check https://wotex.cgeek.fr/?to=inso&pending=on&mod...*Created by: galuel*
I suggest to make Sakia a client without graphical view like we have in WoT view right now, but better to propose the view in the Wotex style, in plain text view, check https://wotex.cgeek.fr/?to=inso&pending=on&mode=u2w for instance
**This could improve the soft and specialize it with :**
- best time response for consultation (it's very long to show graphical view)
- more little client installation space, more efficient
- concentrate into Duniter fondamental features better than graphical views that are mostly Cesium stuff
- better confidence for use for software developpers who don't trust security with javascript in web browser...futurehttps://git.duniter.org/clients/python/sakia/-/issues/616Add a way to include identity proofs in the blockchain2018-09-05T11:56:52+02:00insoAdd a way to include identity proofs in the blockchainFollowing this post : https://forum.duniter.org/t/presentation-membre-tortue/1867/9?u=inso
This is a feature to consolidate the WoT with external proofs, like from centralized institutions like states.
I imagine the feature as the ...Following this post : https://forum.duniter.org/t/presentation-membre-tortue/1867/9?u=inso
This is a feature to consolidate the WoT with external proofs, like from centralized institutions like states.
I imagine the feature as the following :
- The user enters informations depending on his identity card in a dialog. For example, with a french id card, the dialog should be required to enter the following informations :
```
Type: IDCARD
Version: 1
State: France
Numero: [Number of the idcard]
Nom: [Name]
Prenom: [Nickname]
Naissance: [Date of Birth]
Ville: [City]
Expiration: [Expiration date]
```
Note : The fields would probably change depending on the state issuing the IDCard.
All the fields values should be uppercased with no special character. This text would then be hashed. A tx would be sent to himself, with the comment field fill with :
```
IDTYPROOF:IDCARD:XHX(Hash)
```
Then, when an identity requires certification in real life, the other one can ask him to check for his idcard. The software compares the hash of the card shown by the identity with the hash present in the blockchain.
- If the hashes are the same, then for sure he is the same who published the identity
- If the hash is different, there is a problem, and the identity should not be certified
The scenario is useful against sybil attacks. To try to get certifications on a second identity, the attacker needs another idcard. With the same idcard, the software will detect a hash colliding with his previous identity, and he would be discovered.
We should then provide multiple kind of documents to be able to provide multiple proofs when being certified by someone we do not know a lot. The documents required by a given community could change, but should be the same for everyone willing to join a given WoT.futurehttps://git.duniter.org/clients/python/sakia/-/issues/450Add formula and result of max members in information tab2018-09-05T11:56:51+02:00MoulAdd formula and result of max members in information tabAdd a formula and the result of the maximum number of members in the current money system in the section of WoT of the information tab.
f(sigMin ; cert_stock ; wot_diameter) = (cert_stock/sigMin-1)^wot_diameter
With test_net, f(1;40;3) =...Add a formula and the result of the maximum number of members in the current money system in the section of WoT of the information tab.
f(sigMin ; cert_stock ; wot_diameter) = (cert_stock/sigMin-1)^wot_diameter
With test_net, f(1;40;3) = (40/1-1)^3 = 59319.
futurehttps://git.duniter.org/clients/python/sakia/-/issues/426Generate & store revocations document on registering2018-09-05T11:56:51+02:00Cédric MoreauGenerate & store revocations document on registeringAs mentionned in [this topic](https://forum.duniter.org/t/ask-for-certifications-karmak23/859), we need sometime fails to remember or retrieve our private key and thus completely loose control over our identity.
Notably, if we want to c...As mentionned in [this topic](https://forum.duniter.org/t/ask-for-certifications-karmak23/859), we need sometime fails to remember or retrieve our private key and thus completely loose control over our identity.
Notably, if we want to create another identity, other members might be distrustful against the fact to certify another identity of yours while your previous identity is still "usable" (we do not know if you really lost your private key ..).
Duniter protocol provides key revocation to strongly avoid a key to be reused for WoT purposes. A bit like OpenPGP key revocation. You can create the document when you want and store it somewhere for later usage.
Sakia is almost ready for this, as it implemented old revocation mechanism few times ago. Now I suggest Sakia gives us the possibility to store revocations, so we can use them without requiring any password to trigger them. Of course we need a big warning before going any further!
https://git.duniter.org/clients/python/sakia/-/issues/385Print revocation documents in QrCode format2018-09-05T11:56:51+02:00Cédric MoreauPrint revocation documents in QrCode formatLinked to https://github.com/ucoin-io/ucoin-python-api/issues/21
---
In UCPv0.1, the revocation document was just an indicator for nodes to remove an identity. But now, it goes deeper: the revocation is written in the blockchain saying...Linked to https://github.com/ucoin-io/ucoin-python-api/issues/21
---
In UCPv0.1, the revocation document was just an indicator for nodes to remove an identity. But now, it goes deeper: the revocation is written in the blockchain saying:
> This identity won't be usable anymore.
Also, a member sending such a document is immediatly excluded from the WoT.
Revocation documents have no expiry date, and can be printed on some paper to be written later on.
futurehttps://git.duniter.org/clients/python/sakia/-/issues/341"Rechercher des identités"2018-09-05T11:56:52+02:00inso"Rechercher des identités"*Created by: galuel*
In the tab "Rechercher des identités", it would be nice to have always its own identity with a special and unique color (very usefull, when we search to copy/paste quickly our own pubkey for instance), and more: the...*Created by: galuel*
In the tab "Rechercher des identités", it would be nice to have always its own identity with a special and unique color (very usefull, when we search to copy/paste quickly our own pubkey for instance), and more: the distance to any identity we can list (field "Distance", with a number). I suggest then to put 0 for distance to self identity.
futurehttps://git.duniter.org/clients/python/sakia/-/issues/334"Renew membership" ?2018-09-05T11:56:52+02:00inso"Renew membership" ?*Created by: galuel*
I think it should be better to make an advertisement when a new member come in. If he has the certifications he is still not a member, and didn't, and so you could put "you are not a member, you probably would like ...*Created by: galuel*
I think it should be better to make an advertisement when a new member come in. If he has the certifications he is still not a member, and didn't, and so you could put "you are not a member, you probably would like to confirm or renew" somewhere to alert him.
futurehttps://git.duniter.org/clients/python/sakia/-/issues/324Configuration time parameter when start membership expiration warning message2018-09-05T11:56:52+02:00MoulConfiguration time parameter when start membership expiration warning messageConfiguration of a time parameter when start membership expiration warning message.
Considering the warning message is present since this time parameter till membership expiration.
For instance, some would prefer to be notified 1 month...Configuration of a time parameter when start membership expiration warning message.
Considering the warning message is present since this time parameter till membership expiration.
For instance, some would prefer to be notified 1 month or 3 months before his membership expiration.
futurehttps://git.duniter.org/clients/python/sakia/-/issues/156Tab with sent and received certifications2018-09-05T11:56:51+02:00MoulTab with sent and received certificationsIt could be great to have a tab containing sent and received certifications. With displayed the time when begin and expire the certification.
It could be great to have a tab containing sent and received certifications. With displayed the time when begin and expire the certification.
future