For Dev Setup see CONTRIBUTING.MD
SocialConnect is an open source protocol that maps off-chain personal identifiers (such as phone numbers, twitter handles, etc.) to on-chain account addresses. This enables a convenient and interoperable user experience for use cases such as:
Here is a short demo of a payment from a Kaala wallet user to a Libera wallet user, with only a phone number:
SocialConnect uses a federated model, meaning that anyone has the power to be an issuer of attestation mappings. Issuers have the freedom to decide how to verify that the user actually has ownership of their identifier. After verification, issuers register the mapping as an attestation to the on-chain smart contract registry. Attestations are stored under the issuer that registered them. When looking up attestations, we then have to decide which issuers are trusted.
Here are some active issuers verifying and registering attestations:
Issuer Name | Address |
---|---|
Kaala | 0x6549aF2688e07907C1b821cA44d6d65872737f05 (mainnet) |
Libera | 0x388612590F8cC6577F19c9b61811475Aa432CB44 (mainnet) 0xe3475047EF9F9231CD6fAe02B3cBc5148E8eB2c8 (alfajores) |
Off-chain identifiers, originally in plaintext, are obfuscated before they are used in on-chain attestations to ensure user privacy and security. This is done with the help of the Oblivious Decentralized Identifier Service (ODIS). The details of the obfuscation process and how to interact with ODIS are described in the docs about privacy.
We've made a mini-series to explain you:
The following steps use the Celo ContractKit to quickly set you up to play around with the protocol. If you would like to use a different library instead, please refer to the example scripts.
Add the @celo/identity
package into your project.
npm install @celo/identity
Set up your issuer (read "Authentication" section in privacy.md), which is the account registering attestations. When a user requests for the issuer to register an attestation, the issuer should verify somehow that the user owns their identifier (ex. SMS verification for phone number identifiers).
import { newKit } from "@celo/contractkit";
// the issuer is the account that is registering the attestation
let ISSUER_PRIVATE_KEY;
// create alfajores contractKit instance with the issuer private key
const kit = await newKit("https://alfajores-forno.celo-testnet.org");
kit.addAccount(ISSUER_PRIVATE_KEY);
const issuerAddress =
kit.web3.eth.accounts.privateKeyToAccount(ISSUER_PRIVATE_KEY).address;
kit.defaultAccount = issuerAddress;
// information provided by user, issuer should confirm they do own the identifier
const userPlaintextIdentifier = "+12345678910";
const userAccountAddress = "0x000000000000000000000000000000000000user";
// time at which issuer verified the user owns their identifier
const attestationVerifiedTime = Date.now();
Check and top up quota for querying ODIS if necessary.
import { OdisUtils } from "@celo/identity";
import { AuthSigner } from "@celo/identity/lib/odis/query";
// authSigner provides information needed to authenticate with ODIS
const authSigner: AuthSigner = {
authenticationMethod: OdisUtils.Query.AuthenticationMethod.WALLET_KEY,
contractKit: kit,
};
// serviceContext provides the ODIS endpoint and public key
const serviceContext = OdisUtils.Query.getServiceContext(
OdisContextName.ALFAJORES
);
// check existing quota on issuer account
const { remainingQuota } = await OdisUtils.Quota.getPnpQuotaStatus(
issuerAddress,
authSigner,
serviceContext
);
// if needed, approve and then send payment to OdisPayments to get quota for ODIS
if (remainingQuota < 1) {
const stableTokenContract = await kit.contracts.getStableToken();
const odisPaymentsContract = await kit.contracts.getOdisPayments();
const ONE_CENT_CUSD_WEI = 10000000000000000;
await stableTokenContract
.increaseAllowance(odisPaymentsContract.address, ONE_CENT_CUSD_WEI)
.sendAndWaitForReceipt();
const odisPayment = await odisPaymentsContract
.payInCUSD(issuerAddress, ONE_CENT_CUSD_WEI)
.sendAndWaitForReceipt();
}
Derive the obfuscated identifier from your plaintext identifier. Refer to documentation on the ODIS SDK for detailed explanations on these parameters and steps.
// get obfuscated identifier from plaintext identifier by querying ODIS
const { obfuscatedIdentifier } =
await OdisUtils.Identifier.getObfuscatedIdentifier(
userPlaintextIdentifier,
OdisUtils.Identifier.IdentifierPrefix.PHONE_NUMBER,
issuerAddress,
authSigner,
serviceContext
);
Register an attestation mapping between the obfuscated identifier and an account address in the FederatedAttestations
contract. This attestation is associated under the issuer. See docs for more info.
const federatedAttestationsContract =
await kit.contracts.getFederatedAttestations();
// upload identifier <-> address mapping to onchain registry
await federatedAttestationsContract
.registerAttestationAsIssuer(
obfuscatedIdentifier,
userAccountAddress,
attestationVerifiedTime
)
.send();
Look up the account addresses owned by an identifier, as attested by the issuers that you trust (in this example only your own issuer), by querying the FederatedAttestations
contract. See docs for more info.
const attestations = await federatedAttestationsContract.lookupAttestations(
obfuscatedIdentifier,
[issuerAddress]
);
console.log(attestations.accounts);
Type |
---|
ContractKit |
EthersJS (v5) |
web3.js |
NextJS based web app (Phone Number) |
NextJS based templated |
React Native App (Phone Number) |
NextJS based web app (Twitter) |
Server side NextJS (Twitter) |
The Runtime Environments section shows instructions for using SocialConnect with:
For a deeper dive under the hood and specific implementation details, check out the documentation of the protocol for details on how to interact with the on-chain registry, privacy for how identifiers are obfuscated, and key-setup to setup your role keys to interact with the protocol.
Interested in Integrating SocialConnect, get in touch by filling this form.
SocialConnect is in beta! Help us improve by sharing feedback on your experience in the Github Discussion section. You can also open an issue or a PR directly on this repo.