Track 2c: On-Chain Wallet - "Web2"

On-Chain with Wallet Security

Track 7 - Web2. Link with Twitter/Github/Linkedin identity, multi-factor biometric/location/device authentications


Note: to qualify for prizes, project submissions in this category must build upon 1Wallet or SmartVault.


The second hackathon theme is On-Chain with our social wallets and keyless security. The 4 tracks — Frontends, Web3, Web2, Security — emphasize the consumer experience of delighting the users without worrying about blockchain technology or custody. Wallets are becoming the Web3 portals as a DeFi dashboard for asset swaps and investments, a NFT gallery for collectible editorials and auctions, or a DAO townsquare for governance votes or payrolls. Our hackathon encourages seamless onboarding and incentivized education for smart contract wallets; builders can start from our audited prototypes featuring authenticator-based security and on-chain account recovery.

Composing Web3 contracts and integrating Web2 components is the crossing of the chasm for daily uses. Our wallets should work as a mobile or even wearable client. They can also curate crypto and domain names, work activity and reputations, or even virtual and life moments. Furthermore, the wallets can link your identity on Twitter as social clout, Github as work prowess, or Linkedin as tailored profiles. At this hackathon, cryptography or security researchers can extend our authentication to multiple factors, verify implementations with formal methods, or prototype based on our latest research papers. (more)

Spotlighting Track 7 - Web2. Link with Twitter/Github/Linkedin identity, multi-factor biometric/location/device authentications !

Take a peek at these which could help INSPIRE you:

Ready to suggest something interesting and help the world cross the chasm? Reply to this thread .

Ready to build? Sign up at this Gitcoin blurb below!

Hi, I would like to participate in this track. I’m a bit confused by what is allowed for submission. Are we only able to do the following?

cryptography or security researchers can extend our authentication to multiple factors, verify implementations with formal methods, or prototype based on our latest research papers. (more)

Or are we free to extend those 2 target wallets in anyways we see fit?

You’re free to extend the 2 wallets anyway you see fit :slight_smile:

1 Like