Security News
Combatting Alert Fatigue by Prioritizing Malicious Intent
In 2023, data breaches surged 78% from zero-day and supply chain attacks, but developers are still buried under alerts that are unable to prevent these threats.
Stampery = require('stampery');
stampery = new Stampery('yourSecretToken')
stampery.on('proof', function(hash, proof) {
console.log("Received proof for " + hash, proof);
stampery.prove(hash, proof, function (valid) {
console.log('Proof validity:', valid);
});
});
stampery.on('ready', function() {
stampery.receiveMissedProofs();
stampery.hash('The piano has been drinking', function(hash) {
stampery.stamp(hash);
});
});
Here is the same example, just using our beloved IcedCoffeeScript:
Stampery = require 'stampery'
stampery = new Stampery 'yourSecretToken'
stampery.on 'proof', (hash, proof) ->
console.log "Received proof for #{hash}", proof
await stampery.prove hash, proof, defer valid
console.log 'Proof validity:', valid
stampery.on 'ready', ->
stampery.receiveMissedProofs()
await stampery.hash 'The piano has been drinking', defer hash
stampery.stamp hash
Stampery replaces human trust with mathematical truth. To do this, we create immutable proofs of existence, integrity and attribution of any data set, using the Ethereum & Bitcoin blockchains. These proofs are:
To see a quick example of how a proof looks like, here’s one:
[5,"0989551C2CCE109F40BE2C8AD711E23A539445C93547DFC13D25F9E8147886B8D0E71A16FF4DED1CB4BC6AC2E4BBB5722F0996B24F79FC849531FE70BB2DE800",[],[2,"0x5dfd1a08ed51f234be3f7ef13a238e166ec8330895fdc940226cc39866da1a28"]]
A proof is all you need to verify that a data set has been stamped at a given point in time.
We are privacy lovers and we don’t go into the content of what’s being stamped. So our API only takes hashes. That way, we get out of the data format: no matter if you use JSON, XML or MsgPack, hash it with SHA3–512 and you can use our API.
Once your hash hits our API, we do our magic, embed your hash into a cryptographic tree, settle that tree with the Ethereum blockchain, then in the Bitcoin blockchain, and finally give you the proof back. The Bitcoin blockchain is the most secure one in terms of reversibility, and that’s great for strong, trustless timestamping, but it takes around ~10mins for a set of transactions to settle. So we also use the Ethereum blockchain, which is less secure in terms of reversibility (it has less computing power committed to it), but way faster (only 12 seconds to settle), so you can have a first proof in just seconds. Wrapping up: you call our API with your hash, we do our magic and give you the proof back. The first proof is the Ethereum one, the second is Bitcoin’s. Ethereum’s proof is a subset of Bitcoin’s, so in the end, the final proof = 1st proof + 2nd proof.
For the API calls, we use TCP as the transport layer, MsgPack for the encoding of the messages, and RPC as the communication protocol. There are multiple implementations for this, so probably you don’t have to do the work of implementing this yourself. Check some of them.
We use queues as a reliable way of giving your proofs back. We give you a AMQP server to connect to. After calling the API with your hash, You will have to consume** a queue which name is the hash** you sent: both the Ethereum and Bitcoin proofs will be sent there.
In order to verify a hash has been timestamped, you need both the hash and its proof. The process is the following:
Ping us at support@stampery.com and we’ll help you! 😃
FAQs
Stampery API for NodeJS: seamlessly integrate the blockchain-powered, industrial-scale certification platform into your NodeJS apps.
The npm package stampery receives a total of 13 weekly downloads. As such, stampery popularity was classified as not popular.
We found that stampery demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
In 2023, data breaches surged 78% from zero-day and supply chain attacks, but developers are still buried under alerts that are unable to prevent these threats.
Security News
Solo open source maintainers face burnout and security challenges, with 60% unpaid and 60% considering quitting.
Security News
License exceptions modify the terms of open source licenses, impacting how software can be used, modified, and distributed. Developers should be aware of the legal implications of these exceptions.