Welcome to the Elastos Blog
Read it here first
Elastos Bi-Weekly Update – July 9th, 2023
Elastos has made significant progress across its various components in the biweekly tech update. The Main Chain is getting an upcoming upgrade with features related to BNFTs and BPoS nodes registration, which will improve the mainchain BPoS consensus. Side Chain progress includes upgrades to the EID EVM and research regarding integrating DID data into smart contracts. Additionally, improvements have been made to Carrier, focusing on enhancing signature mechanisms and resolving issues with the Active Proxy service.
In the realm of Decentralized Identity (DID), Elastos has made significant progress by revising the Verifiable Credential Context (JSON-LD) specification to include passport-related credentials and enhancing the kyc-me.io service to generate these credentials. These updates contribute to the seamless integration of verifiable credentials within the Elastos decentralized identity framework.
Essentials, the comprehensive Elastos super wallet, has also undergone noteworthy updates, including bug fixes, better displays, improved autofill functionality, and enhanced security features. These biweekly updates reflect Elastos’ commitment to continuously improving its tech stack, providing users with a more robust and user-friendly experience.
- Preliminary testing has been completed for the upcoming upgrade scheduled for release at the end of July, including features like BNFTs, nodes registration for BPoS nodes with multisig wallet, etc.
- A solution to optimize the algorithmic execution process for re-establishing mainchain consensus, has subsequently transitioned into the testing stage.
- The EID EVM has been upgraded to the London version on the main chain.
- Research has been conducted into interaction options between DID and smart contracts, resulting in a formulated solution for smart contracts to access DID data.
- Development to upgrade the EID and ESC sidechain EVM to the Shanghai version has been completed and is now in the testing phase.
- Performance pressure testing for the sidechain has been carried out, with tests focusing on complex situations involving both contract and non-contract transactions.
- The network protocol for the EID sidechain has been adjusted to support version information display.
- Fixed wallet credential expiration time bug.
- Refined the display of wallet balance and amounts of staked ELA when the size of the total assets is low.
- Enhanced the autofill feature for URL addresses in the dApp browser.
- Optimized the password confirmation process during both activation and deactivation of biometric recognition features, such as Fingerprint and FaceID.
- Updated wallet credential implementation to comply with the updated Elastos credential context definition.
- Improved the Identity dApp by enhancing the user experience and rectifying several issues.
- Polished the UI process for DID publishing.
- Conducted testing and validation for the eKYC integrated into key-me.io.
- Upgraded Essentials’ dependency libraries to mainstream versions to mitigate potential security vulnerabilities.
- Launched Essentials version 3.0.9 for Android and iOS platforms.
- Revised the Verifiable Credential Context (JSON-LD) specification to incorporate PassportCredential and derivative credential types such as PassportNumberCredential / PassportNumberHashCredential.
- Resolved compile failure issue in the Native DID unicode normalization dependency library.
- Addressed the issue of lacking prompts during login failures on kyc-me.io when users haven’t created a wallet within EE.
- Fixed the page redirection error encountered when visiting kyc-me.io on the Safari browser.
- Enhanced the kyc-me.io service by adding the capability to generate PassportNumberCredential / PassportNumberHashCredential credentials.
- Improved error messages on kyc-me.io by updating the documentation based on aliCloud documentation.
- Rectified edge-case errors occurring during the interaction between kyc-me.io and Essentials, such as abnormal display after EE restarts.
- Improved the style and user interaction of the prompt dialog box in Essentials on kyc-me.io, and resolved the issue of repetitive pop-up prompts due to consecutive clicking.
- Enabled one-time import of all verified credentials from kyc-me.io into EE.
- Corrected the issue of passport number hash being displayed incompletely on the credential page.
- Assessed and discussed the Custodial DID technical solution to address the demand for easy DID integration.
- Tracked about the list of issues reported to Alibaba Cloud technology.
- Enhanced the signature mechanism for PeerInfo data in Carrier Java.
- In Carrier Native, enhanced the Sign/Verify (data signing and verification) interface of the Node module.
- Troubleshooted the instability issues with the Carrier Active Proxy service.
- Added processing for some prohibited DDNS list domain names in pc2.net/ActiveProxy Helper service, while also enhancing the deployment and debugging connection stability with ActiveProxy on carrier super nodes.
- Continue to add Carrier Swift test cases and address discovered issues.
- Deployed Carrier Java Super Node test nodes to validate the overall ActiveProxy service application workflow.
- Debugged the Carrier Super Node and ActiveProxy Helper service, deployed Local personal website services, registered for DDNS on pc2.net, and made the Local personal website externally accessible.
- Created comprehensive Carrier development guide documents while maintaining active community engagement.
The Trinity Team and Gelaxy Team