Roman Shanin
Roman Shanin
Afaik for the single pair of payload and private key there is more than one valid signature. For elliptic curve signatures this set is large due to selection of pseudorandom...
AFAIK using VRFs should provide secrecy property (so it's up to the leader to reveal itself with block proposal and proof of being the leader). Currently i think we don't...
I don't like changing terminology without good reason.
yes, it was requested by CBDC team (after discussion with @Stukalov-A-M).
Sounds good to me, what are downsides?
As discussed with @Mingela iroha now works in permissioned setups so having recussion problems is OK, it's operator responsibility to control this.
One example is `MetadataChanged` event fields which getters are not implemented.
@DCNick3 yeah, i will clarify that i mean lack of `getters` (or actually any other way to access struct data)
> isn't responsible for running triggers Regarding triggers: - executor already can execute `ExecuteTrigger` isi (so run any by-call trigger) - for event based triggers there isn't much executor can...
I think we can use combination of "offline" and "online" approaches, we can choose some subset of peers in the network and make "offline" backup for their storage. In case...