<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Web3Auth - Medium]]></title>
        <description><![CDATA[Simple auth infra for Web3 apps and wallets - Medium]]></description>
        <link>https://medium.com/toruslabs?source=rss----d7a5d97be647---4</link>
        <image>
            <url>https://cdn-images-1.medium.com/proxy/1*TGH72Nnw24QL3iV9IOm4VA.png</url>
            <title>Web3Auth - Medium</title>
            <link>https://medium.com/toruslabs?source=rss----d7a5d97be647---4</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Mon, 20 Apr 2026 00:30:40 GMT</lastBuildDate>
        <atom:link href="https://medium.com/feed/toruslabs" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[How Web3Auth’s Two-Factor Wallet infra empowered The Masked Singer Experience onboarding experience]]></title>
            <link>https://medium.com/toruslabs/how-web3auths-two-factor-wallet-infra-empowered-the-masked-singer-experience-onboarding-experience-83c3498675?source=rss----d7a5d97be647---4</link>
            <guid isPermaLink="false">https://medium.com/p/83c3498675</guid>
            <category><![CDATA[web3-entertainment]]></category>
            <category><![CDATA[onboarding-process]]></category>
            <category><![CDATA[metaverse]]></category>
            <category><![CDATA[wallet-infrastructure]]></category>
            <category><![CDATA[web-wallets]]></category>
            <dc:creator><![CDATA[Web3Auth]]></dc:creator>
            <pubDate>Thu, 09 Mar 2023 03:02:40 GMT</pubDate>
            <atom:updated>2023-02-20T06:15:14.307Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*C4gwC1iWQJfjkyiARA3kvQ.png" /></figure><p>Today, all of us at Web3auth moved a step closer to realising our mission of passing the identity ownership back to the individuals and users. We partnered with FOX -owned Blockchain Creative Labs (BCL) to provide a seamless Web3 user onboarding experience for The Masked Singer Experience.</p><p><a href="https://twitter.com/i/status/1626028978220990464">https://twitter.com/i/status/1626028978220990464</a></p><p>A typical web3 wallet’s user onboarding experience involves setting up a seed phrase for authentication, which is a complex and tedious task. It takes the user anywhere from 10 to 15 minutes. This timeframe has churn written all over it, and it is quite significant in web3 user adoption standards.</p><p>But this has been the standard practice over the years. After we launched Web3Auth and had numerous customers using our wallet infrastructure, several consumer-focused applications have seen a 3x increase in conversion rates, from 24% to about 63%, as opposed to conventional seed phrase wallet solutions.</p><p>In a significant paradigm shift that we have been able to enable today, we joined forces with FOX Entertainment-owned Blockchain Creative Labs (BCL) to offer the most seamless onboarding experience possible for the fans of The Masked Singer Experience. This digital fan community is an evolution of the singing competition The Masked Singer — television #1 unscripted series.</p><p>With this partnership, Web3Auth will allow the fan community to connect to The Masked Singer Experience seamlessly, by logging in to the experience and setting up a web3 wallet directly via email, social and Google accounts instead of having to use the conventional seed phrase-enabled wallets. After this collaboration with us, users will need only less than a minute to set up their wallet accounts.</p><p>We decided to give this renewed onboarding journey a special name.</p><p><strong>Two-Factor Wallets (2FW)</strong></p><p>Users can set up a 2FW via 2FA flows — including social logins, phone, laptops, or even biometrics which would take less than a minute. The 2FW also significantly enhances wallet security — if one factor is damaged, users can still recover the wallet using the other factors.</p><p>Our Co-founder and CEO Zhen Yu Yong recommends three key factors for web2 businesses to consider for a successful web3 project launch:</p><ul><li>intuitive user experience</li><li>familiar user journey</li><li>security</li></ul><p>He believes that intuitive user experience and accessibility are paramount to allow the show’s fans and crypto enthusiasts to enjoy the reimagined Masker Singer NFT experience.</p><p>But the partnership only makes more sense for Blockchain Creative Labs (BCL). It empowers creators to build their communities through web3-centered fandom experiences that allow people to interact with content in new ways, ultimately reshaping the entertainment industry as we know it by infusing it with a new sense of freedom, access and control. BCL believes the future of the entertainment industry lies within Web3, which will help democratize access to Hollywood, strengthen the bond between creators and their communities and pave new avenues for creativity, innovation and success.</p><p>Today, we have been able to scale Web3Auth to a place where we have already onboarded over 500 web2 and web3 applications and wallets. Today, we are able to clock over 12 million user keys a month, which is an exponential growth from that of last year. But this is only scratching the surface. Having said that, our larger goal is to provide users with Two-Factor Wallets that are secure and seamless.</p><p><em>“We are all set to partner with larger enterprises within entertainment, gaming and blockchain industries. We want to close the gap between Web2 and Web3.”</em></p><p><em>~ Zhen Yu Yong, Co-founder and CEO, Web3Auth.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=83c3498675" width="1" height="1" alt=""><hr><p><a href="https://medium.com/toruslabs/how-web3auths-two-factor-wallet-infra-empowered-the-masked-singer-experience-onboarding-experience-83c3498675">How Web3Auth’s Two-Factor Wallet infra empowered The Masked Singer Experience onboarding experience</a> was originally published in <a href="https://medium.com/toruslabs">Web3Auth</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Important Product Updates — Web3Auth Self Host and Plug and Play]]></title>
            <link>https://medium.com/toruslabs/important-product-updates-web3auth-self-host-and-plug-and-play-590bdf414ef6?source=rss----d7a5d97be647---4</link>
            <guid isPermaLink="false">https://medium.com/p/590bdf414ef6</guid>
            <category><![CDATA[web3-development]]></category>
            <category><![CDATA[pricing-model]]></category>
            <category><![CDATA[core-kit]]></category>
            <category><![CDATA[product-updates]]></category>
            <dc:creator><![CDATA[Web3Auth]]></dc:creator>
            <pubDate>Thu, 09 Mar 2023 03:02:00 GMT</pubDate>
            <atom:updated>2023-03-15T07:49:06.785Z</atom:updated>
            <content:encoded><![CDATA[<h3><strong>Web3Auth Self-host SDK is now Core Kit</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*cqkHtxDR4KzOHb6YXh5PmQ.png" /></figure><p>Simplification in access — a core principle our entire team at Web3Auth consistently strives for. It has been a significant part of our engineering culture. Today, we move a step closer towards our mission to simplify Web3 wallet infrastructure for everyone.</p><h4><strong>Our Self-host SDK is now Core Kit</strong></h4><p>We decided to do a little rebranding to our Self-host SDK, and call it <strong>Core Kit</strong>. Because it is the core infrastructure that resides underneath all of our products. Simple and easy.</p><p>Of course, there are reasons why we chose to change the name.</p><ul><li>The very term self-host could possibly imply that our customers had to do a lot of heavy-lifting.</li><li>It could have been very easily interpreted with our Plug &amp; Play SDK.</li></ul><p>Here is a little context pertaining to the underlying technological architecture in our two flagship SDKs — <strong>Core Kit</strong> (previously Self-host) and Plug &amp; Play.</p><p>These SDKs are built on top of an underlying SDK called <strong>tKey</strong>, which stands for <strong>Threshold Key</strong>. The <a href="https://web3auth.io/docs/sdk/tkey/"><strong>tKey SDK</strong></a> manages private keys by generating shares using <em>Shamir Secret Sharing</em>, a threshold cryptographic algorithm technique. The image below shows how the <strong>tKey SDK architecture</strong> plays out in a virtual environment.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*DG9umliI014EV-K8" /><figcaption>Web3Auth’s tKey SDK architecture</figcaption></figure><p>Now when it came to<strong> Self-host</strong> as a term, ‘hosting by the self’ was a possible misinterpretation we did not want our customers to take away from it.</p><ul><li><strong>Self-host</strong> offered a bundled package of core components or UI-less SDKs to help a customer customize their desired user interface (UI) to further generate and manage their shares. This implies only one thing — <strong><em>it empowers you to retain your own brand’s user interface (UI) and user experience (UX) flow.</em></strong></li><li>On the other hand, the core purpose of our <strong>Plug &amp; Play SDK</strong> was to offer a standardized and default user interface (UI) and a user experience (UX) flow from Web3Auth — <strong><em>so that our customers could seamlessly generate and manage their desired number of shares.</em></strong></li></ul><p>By definition, this particular SDK is supposed to be a set of tools that would help you build an authentication engine for your platform — essentially, a non-custodial wallet. But the problem is that our<strong> Plug &amp; Play SDK</strong> also has a similar purpose, but the only differentiation is that — <em>it allows no room to customize any shares.</em></p><p>The change of name to <strong>Core Kit </strong>also refers to exactly what our SDKs offer — a bundled package of UI-less SDKs (or core components) to help you gain better access and control over the user experience (UX) flows, while retaining your brand.</p><p>Here is what the <strong>Core Kit</strong> entails:</p><ul><li>tKey JS SDK, which works on web and react native.</li><li>A web-based Single Factor Auth SDK.</li><li>A NodeJS Server SDK hosted on the backend nodejs server.</li></ul><blockquote><em>“Owing to this potential misinterpretation, we wanted to take this space and opportunity to explain why we decided to do this rebranding.”</em></blockquote><p>As we move forward, we are soon going to launch the tKey Android iOS SDKs over the coming few months. Besides, we are also going to launch an aggregator SDK for all of the Core Kit in Web, to allow for better ease of integration.</p><p>If you are an enterprise looking to add a powerful web3 component to your existing systems, look no further — <strong>Core Kit</strong> is here!</p><p>Furthermore, below is a summary of all the other product updates we have:</p><h3><strong>A revamped Plug &amp; Play SDK</strong></h3><p>Our<strong> Plug &amp; Play suite</strong> now has all UI SDKs, giving you quick and easy access to our platform.</p><p>Here is what the suit includes:</p><ul><li>a <a href="https://web3auth.io/docs/sdk/web/modal/">Web Modal SDK</a></li><li>a <a href="https://web3auth.io/docs/sdk/web/no-modal/">Web No Modal SDK</a></li><li>an <a href="https://web3auth.io/docs/sdk/android/">Android SDK</a>, an <a href="https://web3auth.io/docs/sdk/ios/">iOS SDK</a></li><li>a <a href="https://web3auth.io/docs/sdk/react-native/">React Native SDK</a></li><li>a <a href="https://web3auth.io/docs/sdk/flutter/">Flutter SDK</a></li><li>a <a href="https://web3auth.io/docs/sdk/unity/">Unity SDK</a></li><li>a Unreal SDK is out, documentation will be launched soon</li></ul><h3><strong>Updated documentation</strong></h3><p>All of<strong> our documentation has been revamped</strong> with a new <a href="https://web3auth.io/docs/quick-start"><strong>quick start</strong></a>, and general flows to highlight our products and integration better.</p><p>Check them out <a href="https://web3auth.io/docs"><strong>here</strong></a>.</p><h3><strong>We’re on Discourse, our newest community portal!</strong></h3><p>We have now fully migrated from GitHub Discussions to <strong>a brand new community forum on Discourse</strong> to enable a superior community support experience, better search capabilities, more accurate suggestions, and quicker responses.</p><p>Join our community forum <a href="https://community.web3auth.io/"><strong>here</strong></a>.</p><p>Over the last <strong>4 years</strong>, our team at Web3Auth has been able to <strong>onboard over 500 applications and wallets</strong> across Web2 and Web3. Today, we manage <strong>more than 12 million user keys a month</strong>, a growth that is significant and exponential from that of our previous years.</p><p>Traditional wallet authentication methods such as seed-phrases, are difficult to remember and are vulnerable to phishing attacks. We have been working hard the last 4 years on various key management technologies and we believe we have been instrumental in pioneering this paradigm shift in the industry, especially after having launched our <a href="https://web3auth.io/mpc.html"><strong>Multi-Party Computation (MPC)</strong></a> technology.</p><p>But this is only the beginning. As we continue this journey to achieve our audacious mission, which is <strong><em>to make digital ownership human-centric and accessible to everyone</em></strong>, we want to thank you for being a part of our thriving community and for your support in helping us build this wallet infrastructure for all.</p><p>We’d love for you to try out Core Kit, the Plug &amp; Play SDKs, and join us in the product conversations on <a href="https://community.web3auth.io/"><strong>Discourse</strong></a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=590bdf414ef6" width="1" height="1" alt=""><hr><p><a href="https://medium.com/toruslabs/important-product-updates-web3auth-self-host-and-plug-and-play-590bdf414ef6">Important Product Updates — Web3Auth Self Host and Plug and Play</a> was originally published in <a href="https://medium.com/toruslabs">Web3Auth</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Web3Auth’s statement on the recent Magic Link phishing attack]]></title>
            <link>https://medium.com/toruslabs/web3auths-statement-on-the-recent-magic-link-phishing-attack-afd7f46566cf?source=rss----d7a5d97be647---4</link>
            <guid isPermaLink="false">https://medium.com/p/afd7f46566cf</guid>
            <category><![CDATA[magic-link]]></category>
            <category><![CDATA[passwordless-auth]]></category>
            <category><![CDATA[phishing-attacks]]></category>
            <dc:creator><![CDATA[Web3Auth]]></dc:creator>
            <pubDate>Thu, 09 Mar 2023 03:01:06 GMT</pubDate>
            <atom:updated>2023-03-01T14:31:19.435Z</atom:updated>
            <content:encoded><![CDATA[<p><em>This is to clarify our response to a detailed internal investigation into a claimed vulnerability attack on Web3 Magic Links.</em></p><p>Today, we want to take this opportunity to address a claimed vulnerability on Magic Links in Web3 highlighted by DFNS.co. Read more <a href="https://www.coindesk.com/tech/2023/02/24/crypto-wallet-firm-dfns-says-magic-links-have-critical-vulnerability/">here</a>.</p><p>The disclosure describes a phishing attack on passwordless Magic Links, that affects Web2 applications but was aimed specifically toward Web3 applications.</p><p><strong>A short summary of the incident with the timelines:</strong></p><ul><li>This phishing method was disclosed to us privately on Thursday, 23rd February 2023, over a voice call.</li><li>Between 23rd and 25th February, upon discovery of the phishing attack, the Web3Auth team launched a detailed investigation into potentially affected users and their accounts.</li><li>In conclusion, the investigation found no cases of existing users being affected by this attack.</li><li>A verification challenge and stricter IP policies were implemented to prevent future phishing attempts on Monday, 27th February, 2023.</li></ul><p><strong>A brief overview of the phishing attack:</strong></p><p>When a user wants to sign up and log in to any user account on the internet, the conventional flow is that he or she would get a verification email with a link to confirm and verify the email address. Upon verification, the user would now be able to access the dashboard or the user account.</p><p>But in this case, which happens to be a phishing attack, a malicious third party comes into play. It triggers a login request, because of which it sends out a passwordless web3 Magic Link to the user’s email. The link could possibly have a call-to-action button that prompts the user to log in. When the user clicks on it, the malicious third party would now be able to log in on behalf of the user, but the user is kept in the dark about the consequences until the account is accessed or altered.</p><p><strong><em>This was how the claimed vulnerability attack unfolded, which turned out to be a well-known phishing attack.</em></strong></p><p>Upon intimation of the issue on 23rd Feb 2023, Web3Auth conducted a detailed investigation into potential scenarios under which the issue might have occurred.</p><p>The investigation found that there were <strong><em>no such cases of this vulnerability</em></strong> found with respect to our existing user accounts. Our current policies that are already in place, display the origination of login requests as well as open channels for support, for identified malicious requests. These shall effectively prepare us for similar malicious incidents where the user did not activate the request in the first place. Rest assured, we continue to conduct our business and everyday operations while our users have absolutely nothing to worry about.</p><p><strong>Our future commitment</strong></p><p>However, this gave us an opportunity to further tighten our existing security measures. As part of some immediate remedial actions, we have proactively added additional security policies to identify potential and existing phishing attacks. This included matching and verification of a numeric login code to identify false requests, along with more stringent IP blocking, if the attack originated from different locations.</p><p>To ensure that we handle similar issues in a timely and effective manner, we have developed a Security SOP. Further, if you happen to discover any issues with our product, please email us at security@web3auth.io. Our team shall quickly review your submission and respond within 72 hours. While submitting these issues, kindly provide as much detail as possible, including steps to reproduce the issue, the potential impact, and any additional information that may be helpful.</p><p><em>Feel free to refer to our </em><a href="https://web3auth.io/docs/contribute/bug-bounty"><em>bug bounty program</em></a><em> as well.</em></p><p>As part of our commitment to platform security, we will acknowledge your submission and keep you informed of our progress in addressing the vulnerabilities. We would also publicly recognize your contribution, with your permission, in our security hall of fame.</p><p>We take the security of our platform very seriously. We acknowledge your support and extend our gratitude for joining us in our mission to improve the security of Web3Auth and Web3 as an entirety.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=afd7f46566cf" width="1" height="1" alt=""><hr><p><a href="https://medium.com/toruslabs/web3auths-statement-on-the-recent-magic-link-phishing-attack-afd7f46566cf">Web3Auth’s statement on the recent Magic Link phishing attack</a> was originally published in <a href="https://medium.com/toruslabs">Web3Auth</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Unlock digital ownership for the mainstream user: Safe{Core} SDK built with Web3Auth]]></title>
            <link>https://medium.com/toruslabs/unlock-digital-ownership-for-the-mainstream-user-safe-core-sdk-built-with-web3auth-9caf864d723?source=rss----d7a5d97be647---4</link>
            <guid isPermaLink="false">https://medium.com/p/9caf864d723</guid>
            <category><![CDATA[safe]]></category>
            <category><![CDATA[account-abstraction]]></category>
            <dc:creator><![CDATA[Web3Auth]]></dc:creator>
            <pubDate>Thu, 09 Mar 2023 03:00:16 GMT</pubDate>
            <atom:updated>2023-03-01T17:06:54.868Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*R2bF7TGP6-Y0jfppb66Vwg.jpeg" /></figure><p>Account Abstraction has been all the rage in recent months. But with all the different specifications, implementations, jargon and use cases it entails, it is very easy to be buried in the weeds. For those looking for an easily pluggable AA SDK, look no further.</p><p>Today, Safe Global (previously Gnosis.safe) <a href="https://safe.global/core">announced</a> the Safe{Core} SDK, in partnership with Web3Auth in making Account Abstraction <strong>an</strong> <strong>end-to-end and <em>production-ready experience.</em></strong></p><p>Here is a snapshot of what the core SDK entails for developers:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*-8dQsGS-CC889-tA" /></figure><p>The company (Safe) reports that its custody infrastructure has been closely audited and tested over the last 5 years, and that it is now able to secure $39 billion in assets today.</p><p>With Web3Auth, this SDK enables mainstream users to enjoy the benefits of an experience they’re already familiar with. Social logins to Two-Factor wallets that leverage the security of their devices as well. Here is where we echo a similar philosophy and align with Safe on the same.</p><p><em>”Today, there is a binary choice for users. They can either completely give up ownership of their assets to a custodian and play in a walled garden, or bear the full responsibility of protecting their assets and scrutinizing every transaction. Small everyday burdens of gas fees, seed phrases, jumping wallets, and switching networks to do simple transactions have made web3 unusable by the masses.</em></p><p><em>We need to do better.”</em></p><p>As for developers, if you want to understand more and build on top of the Account Abstraction experience, join us in a month-long global AA Hackathon. The march for this hackathon starts today, with bounties worth $50,000. Join us today <a href="https://dorahacks.io/hackathon/safe/">here</a>.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=9caf864d723" width="1" height="1" alt=""><hr><p><a href="https://medium.com/toruslabs/unlock-digital-ownership-for-the-mainstream-user-safe-core-sdk-built-with-web3auth-9caf864d723">Unlock digital ownership for the mainstream user: Safe{Core} SDK built with Web3Auth</a> was originally published in <a href="https://medium.com/toruslabs">Web3Auth</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Web3Auth vs Magic — How to choose your Key Management Solution]]></title>
            <link>https://medium.com/toruslabs/web3auth-vs-magic-how-to-choose-your-key-management-solution-10bbbe78e58e?source=rss----d7a5d97be647---4</link>
            <guid isPermaLink="false">https://medium.com/p/10bbbe78e58e</guid>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[private-key]]></category>
            <category><![CDATA[key-management]]></category>
            <category><![CDATA[social-login]]></category>
            <category><![CDATA[magic-link]]></category>
            <dc:creator><![CDATA[Web3Auth]]></dc:creator>
            <pubDate>Thu, 09 Mar 2023 02:59:13 GMT</pubDate>
            <atom:updated>2023-04-24T14:48:36.751Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*2osuXe5soMDramUqHVaQjA.png" /></figure><h3>Web3Auth vs Magic — How to choose your Key Management Solution</h3><h4><strong>Authentication is one of the most important components of any application and as the Web3 movement grows, wallet &amp; </strong>private key <strong>management becomes its most critical aspect. The right to own your own key and the right to own your own identity.</strong></h4><h4><strong>For any dApps, the fundamental question is — how are you managing your users’ wallet? Keeping in mind this critical question, we are comparing two of the leaders in the wallet management space, Web3Auth and Magic.</strong></h4><p>Before we deep dive into the technical details and comparison, let’s understand what these solutions are trying to achieve. Both Web3Auth and Magic replace seed phrases with intuitive one-click logins making onboarding into web3 seamless while giving control to the application to manage their flows.</p><p>Further to that, the infrastructure and usage of both the platforms is very different and needs a deeper understanding. For this, we will be comparing the two platforms on the following aspects:</p><ol><li><strong>Wallet Management: </strong>How the users’ private keys are managed and held safe?</li><li><strong>Authentications Options: </strong>How many types of authentication and 2FA methods are supported?</li><li><strong>Multichain Support: </strong>How many blockchains are supported and utilised?</li><li><strong>White Labelling and Customisation: </strong>How much<strong> </strong>control the developer has on the UX flows?</li><li><strong>Scalability: </strong>How the platforms perform for applications at scale.</li><li><strong>Ease of integration: </strong>How easy it is to implement a basic instance of the platform.</li><li><strong>Open Source &amp; Native platforms support: </strong>How much code is publicly available and audited? How many platforms are supported?</li></ol><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*6TzBe6RmA9C702PBXlZCzA.png" /></figure><h3>Differences in Wallet Management Infrastructure</h3><p>According to the Magic’s <a href="https://magic-whitepaper-key-based-authentication-system.s3.us-west-2.amazonaws.com/Magic+Whitepaper.pdf">Whitepaper</a>,</p><blockquote>“<strong>Magic’s Delegated Key Management leverages Hardware Security Modules (HSMs) provided by Amazon Web Services’ Key Management Service (AWS KMS). Dedicated user master keys generated using AES-256 with 384-bits of entropy are stored on the HSMs</strong>. The master keys never leave the hardware as they are meant to be locked inside and unable to be exported. All encryption and decryption operations happen inside the hardware modules themselves. HSMs are a lot like popular 7 FIDO devices like YubiKeys or hardware-based wallets for cryptocurrency storage such as Trezor or Ledger, but instead of traditional harddrive storage, they sit in the cloud, secured by AWS’s data centers.</blockquote><blockquote><strong>Users’ private keys are encrypted by these hardware-based user master keys</strong>, which means that attackers need to gain access to the hardware to be able to retrieve the keys, and are forced to stay within Magic’s adversarial infrastructure — which is capable to detect, impede, and monitor attacker’s progress to prevent and mitigate any damages.”</blockquote><p>Hence, we can see that <strong>Magic depends on Amazon Web Service’s (AWS) Hardware Security Modules (HSM)</strong> for their key encryption. The users’ private keys are encrypted by these hardware-based user master keys and stored separately in a multi-region MySQL database.. This approach is good in terms of speed and availability, however has a major flaw, wherein the entire private key sits encrypted on the cloud secured by AWS KMS which can be a<strong> single point of failure</strong>. Hence, we can regard their solution as a <strong>semi-custodial system</strong>.</p><p><strong>Web3Auth is a</strong><a href="https://medium.com/toruslabs/web3auth-mpc-is-here-9387d570990b"><strong> fully non custodial MPC (Multi Party Computation) solution</strong></a> where the user keys are distributed across a network of nodes owned by the top firms in the crypto industry and the user’s own devices. This is enabled by an on chain node network distributed key generation followed by an off chain multi-sig. The key is never fully owned by anyone and only the user has the access to it via their own authentication methods. While making a blockchain transaction, the key is never reconstructed or stored anywhere, rather a series of partial signatures are done across the network and user devices and the final signature is generated for the transaction.</p><p>This infrastructure can be used across the world with node availability throughout the world with industry leading speeds and a surety that user keys are never owned by a single entity anytime.</p><p>You can read more about Web3Auth’s <a href="https://web3auth.io/docs/overview/key-management/">Wallet Management Infrastructure</a> and the <a href="https://medium.com/toruslabs/web3auth-mpc-is-here-9387d570990b">New MPC Solution</a>.</p><h3>Authentications Options</h3><p>One of key features of Web3Auth and Magic is the support of any social, federated identity ( Auth0, Firebase, AWS Cognito, etc.) and custom JWT auth providers. This allows developers to integrate any kind of login method, provided they are using JWT ID Token for user registration.</p><p>In addition to this, <strong>Two Factor Authentication</strong> is a key aspect of keeping your accounts secure. Magic supports 2FA with mobile operators like Authy and Google Authenticator and/or SMS authentication giving you the traditional experience of 2FA.</p><p>Web3Auth introduces a new layer of security here with the introduction of <strong>Two Factor Wallets</strong>. Web3Auth actually uses its off chain multi sig to distribute keys into multiple devices and or SMS/ other authentication methods. This enables you to get a true decentralised 2FA setup where your keys are secured even if one of the authentication methods is compromised.</p><h3>Multichain Support</h3><p>Web3Auth’s SDKs are chain agnostic, ie. they can be used on any blockchain. Today there are thousands of dApps built on numerous blockchains that have integrated Web3Auth. On the other hand, Magic supports 20+ popular blockchains.</p><h3>White Labelling and Customisation</h3><p>Web3Auth allows applications and wallets to fully customise and whitelabel the solution. Using the various options of integration available, you can even make Web3Auth totally invisible in the user flow focusing totally on your application end to end. Magic does provide a range of customisation options, but it is limited as compared to Web3Auth.</p><h3>Scalability</h3><p>Both the solutions do very well in terms of scalability of users and availability across multiple regions. Being hosted on AWS HSMs, Magic is available worldwide within their servers. These servers are owned by Amazon.</p><p>Web3Auth’s network of nodes are hosted worldwide and by trusted industry leaders like Polygon, Binance, Tendermint, ENS, Etherscan etc. Additionally, with the new Sapphire network of Web3Auth, applications can choose to run their own nodes in addition to the nodes available publicly giving them flexibility and control over their user scalability.</p><h3>Ease of Integration</h3><p>A basic integration of both the platforms is quite easy and straightforward. With Web3Auth a basic of the Plug and Play SDKs requires just <a href="https://web3auth.io/docs/quick-start"><strong>4 basic steps</strong></a> and with excellent documentation and examples guiding you throughout the journey of building your own customised solution. A basic integration takes less than 15 mins of work and no extra customisation is required for being production ready. You also have the flexibility to migrate to a more advanced integration with our range of SDKs available for different use cases and platforms. We also have an <a href="https://web3auth.io/docs/integration-builder"><strong>integration builder</strong></a> which, according to your requirements, shapes up a ready to use code that can be directly implemented in your application.</p><p>A basic Magic integration takes a similar approach with one additional step. You need to use custom authentication for using any social login provider apart from email passwordless. Their documentation and guides are great to follow along and one can figure out how to implement them easily.</p><h3>Open Source &amp; Native Platform Support</h3><p>Open source is at the heart of decentralisation. Both Web3Auth and Magic have strong multi platform support and an active open source community around their products. Web3Auth supports Android, iOS, Flutter, React Native, Unity and Unreal Engine. Magic supports all of them except Unreal Engine. They additionally support PHP and WordPress logins.</p><p>At Web3Auth, all these SDKs are open sourced alongside our core infrastructural SDKs and smart contracts controlling the nodes as well. These are fully audited by some of the top smart contract auditing firms in the world. For Magic, the SDKs are open source, while the encryption and DKMS remain closed source.</p><h3>Final Thoughts</h3><p>Although Magic is a great product in terms of getting your users onboarded into the Web3 world, it is evident that Web3Auth has a clear advantage on the core infrastructure level over them. Being a more advanced product with a greater emphasis on security, non-custodiality, and customisation, Web3Auth becomes a clear choice in almost every situation where user wallet management and recoverability is an involved factor.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=10bbbe78e58e" width="1" height="1" alt=""><hr><p><a href="https://medium.com/toruslabs/web3auth-vs-magic-how-to-choose-your-key-management-solution-10bbbe78e58e">Web3Auth vs Magic — How to choose your Key Management Solution</a> was originally published in <a href="https://medium.com/toruslabs">Web3Auth</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Web3Auth MPC Snap: Integrating Multi-Factor Authentication Into MetaMask]]></title>
            <link>https://medium.com/toruslabs/web3auth-mpc-snap-integrating-multi-factor-authentication-into-metamask-4e57f07af77?source=rss----d7a5d97be647---4</link>
            <guid isPermaLink="false">https://medium.com/p/4e57f07af77</guid>
            <category><![CDATA[developer-updates]]></category>
            <dc:creator><![CDATA[Web3Auth]]></dc:creator>
            <pubDate>Fri, 13 Jan 2023 03:31:14 GMT</pubDate>
            <atom:updated>2023-01-13T03:31:14.370Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*bId981jAIAK4o9IulKvxTA.jpeg" /></figure><p><em>(Re-posted from MetaMask original blog)</em></p><p>Snaps is the roadmap to making MetaMask the most extensible wallet in the world. As a developer, you can bring your features and APIs to MetaMask in totally new ways. Web3 developers are the core of this growth and this series aims to showcase the novel Snaps being built today.</p><h3>Web3Auth Snap</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*BcDOEW9FgA9Tuvkv.gif" /></figure><p><strong>Snap Repo:</strong> <a href="https://github.com/Web3Auth/openlogin-snap/">https://github.com/Web3Auth/openlogin-snap/</a></p><p><strong>Why did you build it?</strong></p><p>At Web3Auth, we’ve always believed that multi-factor authentication is the best way to secure crypto assets, and is much better than seed phrases. When we saw at ETHBogota that the latest build of MetaMask Snaps allowed Snaps to provide external key management capabilities, we decided to challenge ourselves to integrate MPC tech into MetaMask at the Sozu House hackathon.</p><p><strong>Can you walk us through the technical implementation?</strong></p><ul><li>Our goal was to allow a new user to login and set up 2FA to access their account in MetaMask. Subsequently, under the hood, whenever they try to sign a transaction, our MPC SDK does a threshold ECDSA signature. This is done by splitting a private key into two parts: a local share that’s stored in the snap and one that’s stored on a signing server. Over several communication rounds, the signing server and the snap should be able to jointly sign an Ethereum transaction and have it be confirmed on the Goerli network. Unlike seed phrases, this setup does not have a single point of failure that leads to irreversible loss of keys: if the user’s laptop is hacked, or if the signing server is hacked, the user does not lose their private key.</li><li>Like every other snap, our snap consists of two parts, the actual snap package, and a page that loads/interacts with the snap. Our ideal user flow was to keep all key management interactions within the Metamask extension’s UI, but due to limitations in permissions, we could not do that. Instead, the user authentication happens outside of the snap, and then once that is complete, we migrate the state into the snap. Subsequently, we hook into the RPC engine of Metamask and respond to transaction requests by using our MPC SDK and the migrated state in the snap to generate threshold ECDSA signatures on the transactions. Surprisingly, we were done with the state migration part within the first few hours of the hackathon and were just left with the signing functionality.</li><li>The rest of the process can be further split into two major tasks:</li><li>Repurposing existing Web3 providers with our MPC SDK to handle the incoming transaction requests</li><li>Getting the MPC SDKs running in the Metamask Snaps SES environment</li><li>If you’re familiar with how Metamask works, or how other wallets function, you’ll know that signing an Ethereum transaction requires much more work than just using a private key to sign a message. A lot of work goes into forming the message object that is to be signed. Each transaction follows a particular format that’s specific to each chain and transaction type, has legacy behaviors that need to be supported for backward compatibility, has to get information about the current gas prices, has to calculate the gas to be used / gas limits, and also has to track the account nonce, etc. Thankfully, most existing Web3 providers already do these things out of the box. However, in order to get our threshold signature library to work well with these SDKs we had to dig deep into every single module and replace the eth-sig-util library’s signing functions with our own threshold signature library signing functions, which took a significant amount of time. In addition, because our MPC SDK was chain-agnostic, and didn’t account for Ethereum-specific checks, we also had to reverse engineer and reimplement checks from the eth-sig-util libraries which we had replaced. For example, EIP-2 specifies that the s-value in an ECDSA signature must not be larger than n/2 + 1, where n is the order of the secp256k1 elliptic curve, in order to prevent transaction malleability attacks, which requires ECDSA signing libraries to do a “flip” of the signature if its s-value falls outside of this range.</li><li>Another challenge we faced was getting our MPC SDKs to run in the Metamask Snaps environment. Our MPC SDK uses wasm (compiled from rust) to run efficiently in the browser. Due to the multiple rounds of communication between the SDK and the signing server, it also uses Socket.IO to communicate to avoid the overhead of HTTP headers. While attempting to load our wasm code into the snap, we ran into some strange issues with mixed argument types in the wasm methods. Unfortunately, wasm debugging tools are still very lacking, with error messages being unhelpful and uninformative (eg. “Uncaught RuntimeError: unreachable”). In the end, we hacked our way around this limitation by accepting all mixed inputs arguments as strings, and parsing them as integers/byte arrays within the wasm code itself. Another problem we encountered was that socket.io did not work in the Metamask Snaps environment. Socket.IO is a separate library/specification built on top of normal WebSockets that handles things like connection upgrading, dropped connections, fallbacks to long polling, etc. which are very helpful when using WebSockets in production environments. Unfortunately, we could not get Socket.IO’s libraries to run in the Metamask Snap environment. As such, we had to fallback to normal WebSockets, and also rewrite the signing server to use default WebSockets instead of socket.io, and fallback to a polling strategy if the websocket had issues.</li></ul><p><strong>Can you tell us a little bit about yourself and your team?</strong></p><p>Zhen and I are the cofounders of Web3Auth, and our company specializes in providing intuitive, secure, and non-custodial key management solutions. We believe that good security must be easy to use and invisible, or it will not get adopted widely. That is why we are huge proponents of using multi-factor authentication for private keys.</p><p><strong>When were you first introduced to MetaMask Snaps and what was your experience like?</strong></p><p>We tried Metamask Snaps about a year ago, but unfortunately, it didn’t have the capabilities to allow us to extend the private key management functions within MetaMask back then. With the introduction of SIP-2 recently (thank you Olaf!), which allows snaps to extend MetaMask’s keyring, we’ve been very excited to see what’s possible! While building our snap, I also explored the SES system that MetaMask Snaps is based on, and I think it’s a very solid foundation for MetaMask to act as a platform for developers to add functionality through Snaps.</p><p><strong>What makes MetaMask Snaps different from other wallets?</strong></p><p>The extensibility! I think MetaMask Snaps provides a secure interface for developers to experiment and augment MetaMask without compromising the security of the MetaMask extension itself. Unlike other types of projects, wallets require high standards of security, which means merging in new functionality from third-parties is always a long, arduous process of code review and audits, which stifles innovation. MetaMask Snaps allows the MetaMask team to continue building a secure product, while still allowing external developers to experiment and extend its functionality.</p><p><strong>Tell us about what building Snaps with MetaMask is like for you and your team?</strong></p><p>I think Snaps is definitely the way forward, allowing people to build functionality while still keeping the base MetaMask extension secure. There are a few kinks now but improvements are coming every day but I think it’s very exciting overall.</p><p><strong>What does Snaps mean to you?</strong></p><p>I hope that adding multi-factor authentication capabilities to MetaMask through snaps helps the millions of mainstream users on MetaMask to more securely manage their accounts and prevents them from falling victim to scams and hacks. MFA is already doing this today for billions of Web2 users, and we want to bring those secure best practices to Web3.</p><p><strong>What opportunities do you see with MetaMask Snaps and the possibilities it unlocks for the Web3 space?</strong></p><p>In general, I think Snaps represents a realistic way for MetaMask to open up its codebase for others to contribute to it without compromising security.</p><p><strong>Any advice you would like to share with developers keen to try MetaMask Snaps?</strong></p><p>Just try it! It may seem a little new but it’s been very approachable so far and the support for it is great on the ConsenSys discord channel for Snaps. Lots of amazing devs are working on it and if you want to be part of the conversation in shaping Snaps, now is the time to be building on it and giving feedback!</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=4e57f07af77" width="1" height="1" alt=""><hr><p><a href="https://medium.com/toruslabs/web3auth-mpc-snap-integrating-multi-factor-authentication-into-metamask-4e57f07af77">Web3Auth MPC Snap: Integrating Multi-Factor Authentication Into MetaMask</a> was originally published in <a href="https://medium.com/toruslabs">Web3Auth</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Web3Auth MPC is here]]></title>
            <link>https://medium.com/toruslabs/web3auth-mpc-is-here-9387d570990b?source=rss----d7a5d97be647---4</link>
            <guid isPermaLink="false">https://medium.com/p/9387d570990b</guid>
            <category><![CDATA[developer-updates]]></category>
            <dc:creator><![CDATA[Web3Auth]]></dc:creator>
            <pubDate>Wed, 07 Dec 2022 05:50:45 GMT</pubDate>
            <atom:updated>2022-12-07T05:50:45.836Z</atom:updated>
            <content:encoded><![CDATA[<h4>Harness the Security of Enterprise-Grade MPC and Democratize it for Mainstream Users</h4><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*S4RVXO-ZAIuDYHQG-hVRSA.png" /></figure><p>As the leading non-custodial authentication infrastructure provider with over 8M monthly users, Web3Auth has launched the MPC (Multi-Party Computation) wallet SDK. We are aiming to bring seamless logins and enterprise-grade security from the institutional level to the user level.</p><p>To date, more than 20% of all mined Bitcoin is lost due to mismanaged or stolen seed phrases. To remove this main friction of web3 onboarding and key management issue, it’s time to say bye to the seed phrase.</p><p>On a mission to provide the most seamless login experience for users, wallets, and dapps, recently we integrated our MPC via @Metamask snaps. Take a sneak peek at a Web3 world without seed phrases</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*HjhQ5tMC-k1zSKnD7033TQ.gif" /></figure><p>Other than Metamask, we are onboarding key Web2 gaming players like <a href="https://www.neowizglobal.com/">NEOWIZ</a> and <a href="https://glip.gg/">Glip</a> <a href="https://www.nafeza.gov.eg/en">NAFEZA</a>. Egypt’s newly launched customs platform for importing and exporting also leverages Web3Auth’s MPC technology to seamlessly and securely onboard its users to the blockchain.</p><p>A lot of exciting partners in the pipeline, but first let’s review some basics…</p><h3><strong>What is MPC?</strong></h3><p>MPC, or Multi-Party Computation, is Web3’s version of multi-factor authentication (MFA). It allows users to manage their keys intuitively by using multiple factors to protect their keys, instead of just relying on a single seed phrase to remove it in the process.</p><p>This makes it possible to design crypto wallets that rely on multiple factors to access a user’s funds. It is currently the gold standard for enterprise-grade crypto custody solutions and is used widely by exchanges and financial institutions for managing crypto.</p><h4><strong>Why use MPC technology?</strong></h4><ul><li>MPC is currently the golden standard for enterprise key management which Bitgo and Fireblocks currently offer.</li><li>Coinbase introduced an MPC alpha/beta into their wallet earlier in the year, and now we’re unveiling our MPC SDK that enables any wallet or app to do the same for their users.</li><li>Being able to build on the latest and greatest, we’ve optimized the infrastructure to be usable on all devices, across multiple platforms, with support for globally-distributed low-latency signing.</li><li>Our MPC SDK leverages existing and familiar UI/UX flows, including simple one-click logins and others, check out the flow <a href="https://cdn.discordapp.com/attachments/1022785836284129320/1034363507157782538/One_Click_flow.gif">here</a></li></ul><h3><strong>How is our SDK different from other MPC solutions?</strong></h3><ul><li>Our MPC is the perfect Externally Owned Account (EOA) and can be paired with Gnosis Safe and other Smart Contract Wallet infrastructure (more on this coming soon).</li><li>The existing MPC solutions offered today are all targeted at large enterprises. These MPC solutions are expensive, require a long setup process, or are just too slow to run on consumer devices.</li></ul><p>We think that MPC is too important and too crucial of a technology to be kept out of reach of the average user. MPC security should be the standard for all web3 wallets today. As a wallet infrastructure provider, we have optimized our MPC SDKs to be usable on all devices, across multiple platforms, with support for geo-distributed low-latency signing. It doesn’t matter if you’re a game, an app, a Chrome extension, or even a web wallet running in a mobile browser — our SDKs support that.</p><h3><strong>Our MPC technology key feature includes</strong></h3><ul><li>1.2-second transaction speed (challenge it if you don’t believe us).</li><li>We are chain agnostic (secp256k1, ed25519, BLS and more support)</li><li>Our SDK can be embedded into any web, mobile, and native application.</li><li>The MPC SDK is geo-distributed and horizontally scaled for global distribution.</li></ul><p>For those of you that are already familiar with the multi-factor keys security model at Web3Auth, this blog is just another incremental step towards improving private key security.</p><p>For those of you who aren’t familiar, here’s how multi-factor keys work:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*WiP3RHaLJzzk70tmOm6R7g.png" /></figure><h3><strong>Leveraging our MPC SDK, you can expect the following benefits</strong></h3><ol><li><strong>Reduces account loss from misplaced seed phrases</strong></li></ol><p>There is no seed phrase to manage — shares are managed by intuitive MFA flows that users are familiar with.</p><p><strong>2. Prevent compromised device vulnerabilities</strong></p><p>User accounts are not subjected to frontend vulnerabilities as MPC’s joint computation allows for keyless usage.</p><p><strong>3. Avoid losing funds from dubious transactions</strong></p><p>Safeguard your users’ accounts with a flexible policy engine to set rules — daily transaction limits and blacklist scams.</p><p><strong>4. Expect fluid experiences</strong></p><p>Expect a low latency of less than 1.5s for both login and transaction signing. Allow your users to focus on engaging with your product.</p><p><strong>5. You own the UX, we can be a white-label service provider</strong></p><p>Our MPC can be embedded into any dapp and/or wallet — you own the experience.</p><p><strong>6. You Don’t need to compromise your stack, any platform any chain</strong></p><p>Our MPC SDK is blockchain agnostic, it works on Web, Mobile, and Native applications.</p><h3><strong>Wanna try it?</strong></h3><p>We have an alpha SDK that you can use today <a href="https://web3auth.io/docs/sdk/web/web3auth-mpc">https://web3auth.io/docs/sdk/web/web3auth-mpc</a>. And if you want to take it to production, sign up for early access here <a href="https://web3auth.typeform.com/to/efe3zBzt?typeform-source=web3auth.io">https://web3auth.typeform.com/to/efe3zBzt?typeform-source=web3auth.io</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=9387d570990b" width="1" height="1" alt=""><hr><p><a href="https://medium.com/toruslabs/web3auth-mpc-is-here-9387d570990b">Web3Auth MPC is here</a> was originally published in <a href="https://medium.com/toruslabs">Web3Auth</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[The biggest Hacker House till date — Web3Auth and Solana Team Up in Bengaluru]]></title>
            <link>https://medium.com/toruslabs/the-biggest-hacker-house-till-date-web3auth-and-solana-team-up-in-bengaluru-5882cad6fc26?source=rss----d7a5d97be647---4</link>
            <guid isPermaLink="false">https://medium.com/p/5882cad6fc26</guid>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[development]]></category>
            <category><![CDATA[solana-network]]></category>
            <dc:creator><![CDATA[Web3Auth]]></dc:creator>
            <pubDate>Mon, 27 Jun 2022 07:02:49 GMT</pubDate>
            <atom:updated>2022-06-27T07:02:49.095Z</atom:updated>
            <content:encoded><![CDATA[<h3><strong>The biggest Hacker House till date — Web3Auth and Solana Team Up in Bengaluru</strong></h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*5OakPP7wqOxU0hPXSAlYMQ.jpeg" /><figcaption>With unseen or unheard of early morning queues to enter the venue, the Solana x Web3Auth HH in Bengaluru turned out be a mega event</figcaption></figure><p>Earlier this year we made a special <a href="https://medium.com/toruslabs/solana-and-web3auth-team-up-to-organize-an-unforgettable-6-day-hacker-house-f78b95f9d2e9">announcement</a> about co-organizing 4 global Hacker Houses with Solana. The first such collaboration took place in <a href="https://medium.com/toruslabs/solana-and-web3auth-team-up-to-organize-an-unforgettable-6-day-hacker-house-f78b95f9d2e9">Singapore</a> in February this year over 6 unforgettable days.</p><p>Regarding the next collaboration, we asked our folks on Twitter on where they thought we would be next and guess what, they got it right. Bengaluru, the Silicon Valley of India was indeed to become our second destination for the global tour.</p><h3>Web3Auth on Twitter: &quot;Coming May, we will be co-organizing the Hacker House with @solana in which of the following locations? 🤔 / Twitter&quot;</h3><p>Coming May, we will be co-organizing the Hacker House with @solana in which of the following locations? 🤔</p><p><strong>Highest Turnout Ever<br></strong>India has one of the biggest developer communities in the world and not surprisingly, the event received way more registrations than the venue could accommodate. What happened as a result? A long queue that has never been seen in any of the Solana Hacker House conducted anywhere in the world.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/938/1*jQP3OJjUnptUhC3lPjQDbw.png" /><figcaption>Image from Twitter user <a href="https://twitter.com/Mudit__Gupta">https://twitter.com/Mudit__Gupta</a></figcaption></figure><p>The participants mostly included enterprising college going folks between the age 17–21.</p><p>We caught hold of 14-year old X to find out why he was at the Hacker House (and not in school)</p><h3>Web3Auth on Twitter: &quot;What was a 14-yr old doing at the @solana x Web3Auth @hackerhouses , Bengaluru edition? Shouldn&#39;t he have been in school? 🤔 pic.twitter.com/xFSJxBWLHO / Twitter&quot;</h3><p>What was a 14-yr old doing at the @solana x Web3Auth @hackerhouses , Bengaluru edition? Shouldn&#39;t he have been in school? 🤔 pic.twitter.com/xFSJxBWLHO</p><p><strong>Office Hours with Team Web3Auth</strong></p><p>Fresh from participating at two major blockchain events, first at the <a href="https://medium.com/toruslabs/what-happened-ethamsterdam22-89562c5e8d18">Paris Blockchain Week</a> and later at <a href="https://medium.com/toruslabs/web3auth-at-the-paris-blockchain-week-2022-2a26345c9c06">ETHAmsterdam</a>, team Web3Auth was present in full force at the Bengaluru Hacker House. Web3Auth offered office hours which were attended by different participants. The Web3Auth team patiently spent time answering queries of different kinds ranging from UI/UX to user on-boarding to privacy and security.</p><p><strong>Influencers on Stage — Tanmay Bhat and Biswa Kalyan Rath</strong></p><p>Two major star attractions at the event were two of India’s most famous stand-up comedians. However, only one of them was at the event in capacity as a comic and that was Biswa Kalyan Rath who performed on the second day of the event leaving the young crowd thoroughly entertained. A lot of previously unheard crypto jokes found presence in his set for the Hacker House.</p><h3>Pranav on Twitter: &quot;Day 2 of Solana Hacker House. Great session of learning and developing followed by a refreshing and detoxing set by Biswa Kalyan Rath. Kudos to the organizers @hackerhouses #crypto #solana #biswakalyanrath #HackerHouseBengaluru pic.twitter.com/QL7uFZzGmi / Twitter&quot;</h3><p>Day 2 of Solana Hacker House. Great session of learning and developing followed by a refreshing and detoxing set by Biswa Kalyan Rath. Kudos to the organizers @hackerhouses #crypto #solana #biswakalyanrath #HackerHouseBengaluru pic.twitter.com/QL7uFZzGmi</p><p>The other star attraction was Tanmay Bhatt who was at the event in capacity as a member of the SuperTeam DAO. The SuperTeam DAO’s main role is to help grow the Solana ecosystem in India, South East Asia, Eastern Europe, and Africa. Tanmay, one of India’s most well-known digital content creators, offered a very insightful presentation on “how to make good content?”</p><h3>Web3Auth on Twitter: &quot;Throwback to this wonderful session from @thetanmay at The @solana x Web3Auth @hackerhouses Bengaluru. Tanmay spoke about the importance of building suspense and we want you to know that our token launch will happen on... pic.twitter.com/kdMO7B0V4W / Twitter&quot;</h3><p>Throwback to this wonderful session from @thetanmay at The @solana x Web3Auth @hackerhouses Bengaluru. Tanmay spoke about the importance of building suspense and we want you to know that our token launch will happen on... pic.twitter.com/kdMO7B0V4W</p><p><strong>Many Applications Integrated with Web3Auth</strong></p><p>Web3Auth was integrated with many applications being built at the Hacker House. We showcase two such integrations in the videos below.</p><h3>Web3Auth on Twitter: &quot;Want to hang your NFTs at the Taj Mahal? 🤯 #Web3 #nfts pic.twitter.com/P6j72v8vkb / Twitter&quot;</h3><p>Want to hang your NFTs at the Taj Mahal? 🤯 #Web3 #nfts pic.twitter.com/P6j72v8vkb</p><h3>Web3Auth on Twitter: &quot;Is it possible to flaunt NFTs to earn? @nftsoul_io #NFT #web3 pic.twitter.com/ww1wDacCWX / Twitter&quot;</h3><p>Is it possible to flaunt NFTs to earn? @nftsoul_io #NFT #web3 pic.twitter.com/ww1wDacCWX</p><p><strong>Web3Auth on Stage<br></strong>Our Sr Software Engineers Shubham Rathi and Himanshu Chawla presented practical and valuable insights on how the young developers in the audience can leverage Web3Auth’s SDKs to increase conversion rate one their dApps.</p><p><strong>Conclusion</strong></p><p>All in all, the Bengaluru Hacker House was one of the most successful Hacker Houses conducted till date and we’re already looking forward to the next time we will be in India.</p><h3>JavaScript is not available.</h3><p></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=5882cad6fc26" width="1" height="1" alt=""><hr><p><a href="https://medium.com/toruslabs/the-biggest-hacker-house-till-date-web3auth-and-solana-team-up-in-bengaluru-5882cad6fc26">The biggest Hacker House till date — Web3Auth and Solana Team Up in Bengaluru</a> was originally published in <a href="https://medium.com/toruslabs">Web3Auth</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Introducing Sign-in with Web3 — Building a Non-Custodial World]]></title>
            <link>https://medium.com/toruslabs/introducing-sign-in-with-web3-building-a-non-custodial-world-50136b3a6225?source=rss----d7a5d97be647---4</link>
            <guid isPermaLink="false">https://medium.com/p/50136b3a6225</guid>
            <category><![CDATA[web3]]></category>
            <category><![CDATA[blockchain-technology]]></category>
            <category><![CDATA[blockchain-development]]></category>
            <dc:creator><![CDATA[Web3Auth]]></dc:creator>
            <pubDate>Wed, 15 Jun 2022 10:59:17 GMT</pubDate>
            <atom:updated>2022-06-15T10:59:17.059Z</atom:updated>
            <content:encoded><![CDATA[<h3>Introducing Sign-in with Web3 — Building a Non-Custodial World</h3><p>In a much needed multi-chain extension to Sign-in with Ethereum, users will now be able to control their digital identity with their Ethereum/ENS, Solana, and Starknet accounts instead of relying on traditional/custodial profiles.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*2NjS8P1HrRwP1n0O" /></figure><p><strong>Importance of building a non-custodial future</strong></p><p>In crypto, there is a saying that goes “<em>Not your keys, not your crypto ‘’ exemplifying</em> the importance of non-custodiality, — the need to shift the dynamic of ownership from entities to the end-user. The principle also extends beyond just the crypto you hold to your very identity itself. While traditional Web2 entities have done a tremendous job in making the user experience incredibly intuitive but that has also come at a cost — the cost of privacy.</p><p>There is excessive monetization of the users’ activity and their residing information on the web. Security compromises even among the biggest names in cybersecurity are increasingly common. As the average user is becoming more and more aware of these tradeoffs, the voice to safeguard their identity is growing louder by the day. We at Web3Auth firmly believe that non-custodiality is the future and we want to lead the way in making it happen.</p><p><strong>Sign-in With Web3 — You Own Your Identity</strong></p><p>Web3 has to a large extent cracked the code for the user privacy problem. The power of public and private keys, enabled by crypto technologies, allows users to own their username, and profile data, and use their accounts across different applications. This is the fundamental on which built Web3Auth was built — to leverage the power of threshold cryptography to shift the dynamic of power from entities to individuals. When the Ethereum Foundation announced Sign-in with Ethereum, it was not only an important(albeit silent) innovation for the internet, it was also a solid validation and acknowledgement of our core values.</p><p>Sign-in with Web3 adds on to that innovation with a powerful multi-chain twist. It extends that innovation to some of the biggest chain ecosystems. Starting today, users on the Ethereum, Solana, and Starknet chains can log in to any Web2 application using their web3 identities thereby bringing the security and privacy of Web3 authentication to Web2.</p><p><strong>What Does Sign-in With Web3 Solve?</strong></p><p>Today, there are multiple blockchain platforms and thus naturally, there arises a need to have a standard specification for authentication with Web3 identities. This led to the birth of<a href="https://github.com/ChainAgnostic/CAIPs/blob/master/CAIPs/caip-74.md"> CAIP-74</a> which allows for creating a chain-agnostic Object Capability (CACAO), based on a signing message as an IPLD object. Sign in with Web3 endeavours to maintain compatibility with CAIP-74, thereby adhering to a chain agnostic standard.</p><h3>Supported Chains<a href="https://siww.web3auth.io/#supported-chains">​</a></h3><p>Currently, Sign-in with Web3 supports</p><ol><li>Ethereum</li><li>Solana</li><li>Starknet</li></ol><p>**Support for more chains coming soon.</p><p>Do check our<a href="https://siww.web3auth.io/"> documentation</a> for a step by step guide on how to build a Sign-in with Web3 flow to navigate the authentication logic. Feel free to reach out to us in case you have questions on our<a href="https://t.me/web3authdev"> Telegram Chat</a></p><p>Additionally, Web3Auth, the creator of Sign-in with Web3, offers a dedicated <a href="http://docs.web3auth.io">suite of authentication</a> tools for all Web3 Developers. This includes support for OAuth and native biometric login using our Plug and Play SDK. You can also utilise one of the leading wallets in the Web3 ecosystem, i.e., the Torus Web3 Wallet.</p><p><strong>Stay in touch with Web3Auth</strong></p><p><a href="http://web3auth.io/">Website</a> |<a href="https://docs.web3auth.io/"> Docs</a> |<a href="https://twitter.com/web3auth"> Twitter</a> |<a href="https://t.me/web3authdev"> Telegram</a> |<a href="http://discord.gg/web3auth"> Discord</a> |<a href="https://www.linkedin.com/company/web3auth"> Linkedin</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=50136b3a6225" width="1" height="1" alt=""><hr><p><a href="https://medium.com/toruslabs/introducing-sign-in-with-web3-building-a-non-custodial-world-50136b3a6225">Introducing Sign-in with Web3 — Building a Non-Custodial World</a> was originally published in <a href="https://medium.com/toruslabs">Web3Auth</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Web3Auth and StarkWare Announce Strategic Partnership]]></title>
            <link>https://medium.com/toruslabs/web3auth-and-starkware-announce-strategic-partnership-142ce14fda1a?source=rss----d7a5d97be647---4</link>
            <guid isPermaLink="false">https://medium.com/p/142ce14fda1a</guid>
            <category><![CDATA[blockchain]]></category>
            <category><![CDATA[development]]></category>
            <category><![CDATA[web3]]></category>
            <dc:creator><![CDATA[Web3Auth]]></dc:creator>
            <pubDate>Wed, 08 Jun 2022 11:03:20 GMT</pubDate>
            <atom:updated>2022-06-08T11:03:16.364Z</atom:updated>
            <content:encoded><![CDATA[<h3>The partnership will work towards making it easy for everyone to interact with the blockchain — self-custodially and without seed phrase</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*_GgYvo4VJbHoWVYj" /></figure><p><strong>Web3Auth and StarkWare Sign-in a Strategic Partnership</strong></p><p>Web3Auth and StakWare enter into a Strategic Partnership that will provide a major push to our shared vision of onboarding the next billion users into Web3. The genesis of StarkWare lies in improving scalability and privacy on the blockchain so as to accommodate more and more users. Web3Auth’s origins lie in the fact that seed phrases create a huge entry barrier in onboarding mainstream users into blockchain applications. Given their strikingly similar genesis, it is only natural that both ecosystem stakeholders joined forces to increase mainstream adoption of crypto.</p><p>What does the partnership entail?</p><p><strong><em>Uri Kolodny, CEO &amp; Co-Founder, StarkWare:</em></strong></p><p><em>“Our teams share the mutual goal of bringing web3 closer to mainstream users. With Web3Auth providing easy login and onboarding of users, and with StarkWare providing low gas costs and security, this partnership is a natural and important step in achieving this goal.”</em></p><p><strong>StarkWare Offers Grant to Web3Auth</strong></p><p>In a major endorsement for Web3Auth’s mission, StarkWare has offered Web3Auth a grant to ensure its self-custodial private key infrastructure powers as many dApps and wallets in the Web3 eco-system as possible. How we onboard users and handle their private keys in the next few years will largely determine the pace at which the Web3 eco-system will grow. The grant will be used by Web3Auth to to make its authentication suite available and accessible to as many developers as possible and by doing so, to more and more applications and users.</p><p><strong>Web3Auth Announces Sign-in With StarkWare</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*w_YXAEiwU9uTon-w" /></figure><p>Also as part of the partnership, last week, Web3Auth and StarkWare <a href="https://medium.com/toruslabs/sign-in-with-starkware-711d48f2dbbd">announced Sign-in With StarkWare</a><strong>, </strong>a unique initiative that brings in the security of StarkWare to Web2 allowing users to sign-in to any Web3 application using their StarkWare account.</p><p><strong>Quote from Zhen, CEO &amp; Co-founder, Web3Auth:</strong></p><p><em>“Our partnership with StarkWare is a natural evolution of both our organizations’ genesis — to make blockchain more accessible to the masses. This partnership holds immense possibilities for the ecosystem overall and we are excited to see what it unfolds”</em></p><p><strong>Web3Auth SDK now supports key generation and management on the STARK curve</strong></p><p>Web3Auth strongly believes that ZK-Rollups such as StarkWare’s scaling solutions have played and will continue to play a huge role in making the Blockchain more usable and secure. Web3Auth extends 100% support to all developers building on the StarkWare family to seamlessly onboard their userswhile keeping core principles of self-custodiality intact.</p><p><strong>Coming Soon…</strong></p><p>From TSS on STARKs to JWT verification on StarkNet, stay tuned for more updates.</p><p><strong>About Starkware family:</strong></p><p><strong>StarkWare </strong>develops STARK-based solutions for the blockchain industry.</p><p><strong>StarkEx</strong>, is a standalone permissioned scaling engine that already powers few of the biggest applications such as dYdX, Sorare, Immutable, DiversiFi and Celer. <strong>StarkNet</strong> is a decentralized permissionless STARK-powered L2 ZK-Rollup over Ethereum, that supports general-computation based on the Cairo language.</p><p><strong>About Web3Auth:</strong></p><p>Web3Auth is a leading non-custodial private key management infrastructure that helps dApps and Wallets on-board users eliminating the need for seed phrases.</p><p><strong>Stay in touch with Web3Auth</strong></p><p><a href="http://web3auth.io/">Website</a> | <a href="https://docs.web3auth.io/">Docs</a> | <a href="https://twitter.com/web3auth">Twitter</a> | <a href="https://t.me/web3authdev">Telegram</a> | <a href="http://discord.gg/web3auth">Discord</a> | <a href="https://www.linkedin.com/company/web3auth">Linkedin</a></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=142ce14fda1a" width="1" height="1" alt=""><hr><p><a href="https://medium.com/toruslabs/web3auth-and-starkware-announce-strategic-partnership-142ce14fda1a">Web3Auth and StarkWare Announce Strategic Partnership</a> was originally published in <a href="https://medium.com/toruslabs">Web3Auth</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>