Justin Holmes
Justin Holmes
This is really two things, right? One is providing a compound condition such that evaluation requires hammering of the provider. The other is providing a compound condition with strenuous CPU...
Seems... reasonable I guess. What's the use case again? Obviously you want to be able to programmatically obtain the constant, but why?
What about `getattr(constants, mode.upper())`?
Makes sense in broad terms. I do wonder if there's a simpler way to do browser verification; perhaps in nucypher-ts. But yeah, I don't see a reason that `evaluation_arguments` ought...
...but what advantage are we gaining by using a Schnorr sig over a digest (HMAC-ish)? Just that Enrico can optionally reuse the private key as a branding mechanism?
This error seems to be raised if not enough cFrags are present to open the `Capsule`. However, currently the assertion requires original `Alice` components to check. @cygnusv: Is there a...
Poking around, I seem to be able to generate this error in two ways: 1) Trying to decap with the wrong private key. 2) Trying to decap without enough cFrags....
> There are many possible problems that may make this check to fail, but from the cryptographic point of view, we don't want to give detailed information of the error...
> Yes, that's true, but that's not the target type of adversary for this measure. We are dealing here with the ones that have black-box access (e.g., remote access). Exactly,...
**Comment by [KPrasch](https://github.com/KPrasch)** _Saturday Mar 31, 2018 at 02:05 GMT_ ---- - With regard to naming, `Agreement` == `Arrangement`. - IMO, Yes, Alice can have complete discretion over the Miners...