►
From YouTube: Lisbon Hack Week // Peer-Pad: Authentification with Ethereum - Pedro Teixeira, Joao Santos
Description
Originally recorded during the Lisbon Hack Week from May 21-25, 2018.
A
This
is
about
well,
it's
a
hack,
fun
hack,
to
create
a
logins
system
for
peer
Pat.
Okay,
so
I
can
go
here
and
change
and
change
your
and
change
your
your
name
and
it
says
justice
charity.
So
there
is
no
there's
no
authenticity
to
this
data.
So
what
would
be
fine?
We
thought
would
be
to
use
meta
mask
to
provide
some
type
of
identity.
B
So
meta
mask
has
two
offers
two
main
properties.
The
first
one
is
that
it
offers
a
gateway
to
the
etherium
network.
So
in
a
browser
environment
it
exposes
an
object
which
you
can.
You
can
use
to
like
query.
The
etherium
network
like
issue
transactions
like
read
the
set
of
the
network,
but
it
also
acts
as
a
a
wallet
for
your
etherium
keys.
So
even
without
being
connected
to
a
theorem,
you
can
sign
and
verify
transaction
signatures
and
digital
signatures
as
well,
and
madam
asked
also
implements
some
ways
that
you
can
sign
messages.
B
B
So
we
started
by
just
signing
the
ipfs
ID
and
then
sending
that
signature
to
the
other
person,
alongside
with
the
meta
mask
address
like
the
etherium
address,
which
is
a
public
key
and
then
the
other
peer
can
could
verify
that
signature
and
say
that
okay,
so
this
ipfs
PID
belongs
to
this
aetherium
accounts,
then
we
took
it
a
step
further,
which
is
well.
You
can
actually
use
the
etherium
smart
contracts
to
prove
some
to
to
place
like
some
proof
of
personhood
inside
it.
B
So
you
can
point
it
to
your
Twitter
accounts
within
which
you
say
hey.
This
is
me
here
is
my
dream:
dress.
You
can
probably
like
to
Facebook
account
as
well.
You
can
point
it
like
to
your
social
security
card.
Whatever,
like
you,
can
fruit
any
number
of
proofs
of
personhood
inside
Miriam,
smart
contract,
so
from
then
from
there.
What
we
did
was,
instead
of
just
signing
the
ipfs
ID
and
sending
the
ipfs
ID
to
the
other
node
signs.
B
We
sent
the
same
signature,
but
with
the
an
address
of
a
smart
contracts
and
then
in
order
to
verify
the
message
what
the
node
does
is.
It
goes
to
smart
contracts,
which
has
my
public
key.
My
three
mullet
key
gets.
The
key
from
there
can
also
query
the
smart
contract
to
make
sure
that
I'm
who
I
say
I
am
and
I'm
taking
that
he
verifies
the
signature
of
the
ipfs
ID
and
then
this
is
like
super
confuse,
which
will
will
give
it
a
better
look.
B
A
B
B
B
Let
me
see
if
it's
okay,
so
it's
here
so
right
now
it
says
that
I
am
sending
my
ipfs
ID,
so
I
sign
that
whether
did
the
same
right,
yep
yeah.
So
now
our
nodes
are
querying
the
smart
contract
getting
the
key
and
verifying
the
signature.
They
are
also
grabbing
any
proof
of
personhood
that
might
be
in
the
smart
contract
and
in
this
case
it's
like
a
link
to
a
Twitter
post,
which
you
can
then
open
and
see
that
this
is
indeed
mr.
potato
potato
and
that's
that's
the
the
OH.
B
So
in
this
case
it's
like
this
would
be
the
link
to
your
three
mobile
address.
In
this
case,
we
like
use
the
wrong
Twitter
link,
so
it's
pointing
to
an
IP
FS
object,
but
in
the
same
Twitter
feed,
there's
a
a
three-room
dress,
so
what's
happening
here
in
the
smart
contract
is
so
for
every
user.
You
have
a
smart
contract
like
every
smart
contract
response
to
one
identity,
and
then
you
can
query
a
bunch
of
stuff
from
that
right.
So,
in
this
case,
I
am
using
this
one.
This
is
the
address
of
the
smart
contract.
B
We
are
querying
right
now,
which
is
my
smart
contract,
and
you
can
get
a
bunch
of
stuff
from
it,
so
you
can
make
sure
that
it
has
not
been
revoked.
You
can
get
the
nickname
you
can
get
the
owner,
which
is
this
public
key
right
here,
which
corresponds.
So
it's
like
zero.
Six,
four,
eight
one
zero,
which
corresponds
to
my
aetherium
mobile
address
right
here,
because
I
created
this
smart
contract
using
this
address
and
then
from
there
you
take
this
key
and
you
can
verify
the
signature
on
the
other
side
yeah.