As the Incognito network grows so does the value of the chain and the possibility of a hack such as attempting to steal someone’s private key or malicious software such as a wallet app pretending to be trusted increase. The Incognito team not only wants to develop the world’s best privacy chain but also protect user’s assets therefore we are planning on bringing Incognito to the hardware wallet developed by Ledger(https://www.ledger.com/). This will provide our users with a more secure place to store their private keys and make transactions.
- Software and online wallets are not well protected as against platforms and servers hacking/breaching.
- There’re so many malicious “trusted” software and online wallets out in the wild.
- Having to import your private key every time you change to a new wallet isn’t a great user experience and a security risk.
With hardware wallet, we have:
- The private keys always-on device.
- Pin-locked action. (have to unlock wallet to be able to transact)
- Don’t need to import keys when moving to a new wallet/platform.
In case you don’t know what a hardware wallet is, our friends at Binance Academy had written a great article explaining it here (https://academy.binance.com/en/articles/what-is-a-hardware-wallet)
Research & Features planning: 2 weeks
- Read sample code & try samples on HW (1 week)
- Features research (1 week)
Implementation: 6 weeks
Hardware: (4 weeks)
Generate Keys (1 week)
- Generate a new Incognito key set
- Recover wallet from seed words
- Import from a private key
Sign transactions (3 weeks)
- Generate coin commitment
- Generate key image
- Generate asset tag
- Generate OTA
- Encrypt/Decrypt coin value
- Generate ring signature
- Generate bulletproof
App Integration: (2 weeks)
- Building on top of Incognito Devframework
- A tool for testing and interacting with the Incognito ledger app
Integration & Test: (4 weeks)
- Integration & test with application wallets (mobile app, web app, extension)
Total length: 12 weeks