Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support of other KSM networks #886

Closed
ssfking opened this issue Nov 25, 2021 · 5 comments
Closed

Support of other KSM networks #886

ssfking opened this issue Nov 25, 2021 · 5 comments

Comments

@ssfking
Copy link

ssfking commented Nov 25, 2021

Hi there, is it possible to add custom KSM networks like Kilt that just completed the KSM crowdloan? I am unable to sign transactions in the Kilt network using my KSM account in the Parity Signer app right now. Thanks

@Slesarew
Copy link
Contributor

Not to Signer currently in stores. Signer in master branch can do it through use of /rust/generate_message tool

@carltraveler
Copy link

carltraveler commented Dec 15, 2021

when does the new verison will released. it will support other parachain?. I think many people in the polkasystem use parity-signer as a hardwallet. and seems the new test version can not installed directly without remove the old version.

@Slesarew
Copy link
Contributor

It should fully support parachains, although I'm not fully certain until I get enough testers reports on their experience with generating and using Signer update messages.

Yes, new version will require removal of the old one; this is the only proper way to update the code for Signer. There is at least one more hard breaking planned update in future which will significantly improve app's usability - #898 will allow on-chain verification of network information known by Signer. But the whole point now is to minimize number of re-installs since they are complicated indeed.

Also, nobody should rely solely on Signer to store keys, since it is just a phone after all, and those break. You should keep some kind of seed phrase backup at all times and be ready to restore from it. Thus we are trying to simplify restoration flow as much as possible too, but that's subject of research now.

@carltraveler
Copy link

thanks for patient answer. great work. appreciate that

@Slesarew
Copy link
Contributor

Slesarew commented May 6, 2022

unsupported version

@Slesarew Slesarew closed this as completed May 6, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants