Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Index paymentReference in storage subgraph for unencrypted requests #19

Open
MantisClone opened this issue Aug 13, 2024 · 3 comments
Open

Comments

@MantisClone
Copy link
Member

MantisClone commented Aug 13, 2024

Problem

We're considering a feature for REQScan to search for a request by paymentReference.

Solution

Building such a feature would be easier if the storage subgraph calculated and indexed the paymentReference whenever it indexed a new unencrypted request.

Considerations

In the past, we have tried to keep a layer of privacy by obscurity between the paymentReference and the request. But anyone can derive the paymentReference from an unencrypted request. Should we maintain privacy by obscurity?

@MantisClone MantisClone converted this from a draft issue Aug 13, 2024
@MantisClone
Copy link
Member Author

Linking the payment to an unencrypted request is technically possible, but difficult. This issue is proposing to make it easy - via REQScan.

Linking the payment to an encrypted request remains impossible.

@MantisClone MantisClone moved this from 🆕 New to ✨ Backlog: Enhancements in Request Network Tech Backlog Aug 19, 2024
@MantisClone
Copy link
Member Author

Delay until V2. In V1, we'll calculate the paymentReference in the frontend.

@Fpinto29
Copy link

Delay to V3

@MantisClone MantisClone removed this from the Request Scan V2 milestone Oct 15, 2024
@MantisClone MantisClone moved this from ✨ Backlog: Enhancements to 🎫 Backlog in Request Network Tech Backlog Oct 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: 🎫 Backlog
Development

No branches or pull requests

2 participants