Important
SocialConnect is an open source protocol that maps off-chain personal identifiers (such as phone numbers, twitter handles, etc.) to on-chain account addresses. This enables a convenient and interoperable user experience for use cases such as:
- payments - send money directly to your friend's phone number!
- social discovery - find someone's account based on their twitter!
- any other identity applications!
Here is a short demo of a payment from a Kaala wallet user to a Libera wallet user, with only a phone number:
SocialConnect uses a federated model, meaning that anyone has the power to be an issuer of attestation mappings. Issuers have the freedom to decide how to verify that the user actually has ownership of their identifier. After verification, issuers register the mapping as an attestation to the on-chain smart contract registry. Attestations are stored under the issuer that registered them. When looking up attestations, we then have to decide which issuers are trusted.
Here are some active issuers verifying and registering attestations:
Issuer Name | Address |
---|---|
Kaala | 0x6549aF2688e07907C1b821cA44d6d65872737f05 (mainnet) |
Libera | 0x388612590F8cC6577F19c9b61811475Aa432CB44 (mainnet) 0xe3475047EF9F9231CD6fAe02B3cBc5148E8eB2c8 (alfajores) |
Off-chain identifiers, originally in plaintext, are obfuscated before they are used in on-chain attestations to ensure user privacy and security. This is done with the help of the Oblivious Decentralized Identifier Service (ODIS). The details of the obfuscation process and how to interact with ODIS are described in the docs about privacy.
We've made a mini-series to explain you:
- Celo Spark: SocialConnect Mini-Series (1/3) — What Is It?
- Celo Spark: SocialConnect Mini-Series (2/3) — How Does It Works?
- Celo Spark: SocialConnect Mini-Series (3/3) — Coding Session
The following steps use the Celo ContractKit to quickly set you up to play around with the protocol. If you would like to use a different library instead, please refer to the example scripts.
-
Add the
@celo/identity
package into your project.npm install @celo/identity
-
Set up your issuer (read "Authentication" section in privacy.md), which is the account registering attestations. When a user requests for the issuer to register an attestation, the issuer should verify somehow that the user owns their identifier (ex. SMS verification for phone number identifiers).
import { newKit } from "@celo/contractkit"; // the issuer is the account that is registering the attestation let ISSUER_PRIVATE_KEY; // create alfajores contractKit instance with the issuer private key const kit = await newKit("https://alfajores-forno.celo-testnet.org"); kit.addAccount(ISSUER_PRIVATE_KEY); const issuerAddress = kit.web3.eth.accounts.privateKeyToAccount(ISSUER_PRIVATE_KEY).address; kit.defaultAccount = issuerAddress; // information provided by user, issuer should confirm they do own the identifier const userPlaintextIdentifier = "+12345678910"; const userAccountAddress = "0x000000000000000000000000000000000000user"; // time at which issuer verified the user owns their identifier const attestationVerifiedTime = Date.now();
-
Check and top up quota for querying ODIS if necessary.
import { OdisUtils } from "@celo/identity"; import { AuthSigner } from "@celo/identity/lib/odis/query"; // authSigner provides information needed to authenticate with ODIS const authSigner: AuthSigner = { authenticationMethod: OdisUtils.Query.AuthenticationMethod.WALLET_KEY, contractKit: kit, }; // serviceContext provides the ODIS endpoint and public key const serviceContext = OdisUtils.Query.getServiceContext( OdisContextName.ALFAJORES ); // check existing quota on issuer account const { remainingQuota } = await OdisUtils.Quota.getPnpQuotaStatus( issuerAddress, authSigner, serviceContext ); // if needed, approve and then send payment to OdisPayments to get quota for ODIS if (remainingQuota < 1) { const stableTokenContract = await kit.contracts.getStableToken(); const odisPaymentsContract = await kit.contracts.getOdisPayments(); const ONE_CENT_CUSD_WEI = 10000000000000000; await stableTokenContract .increaseAllowance(odisPaymentsContract.address, ONE_CENT_CUSD_WEI) .sendAndWaitForReceipt(); const odisPayment = await odisPaymentsContract .payInCUSD(issuerAddress, ONE_CENT_CUSD_WEI) .sendAndWaitForReceipt(); }
-
Derive the obfuscated identifier from your plaintext identifier. Refer to documentation on the ODIS SDK for detailed explanations on these parameters and steps.
// get obfuscated identifier from plaintext identifier by querying ODIS const { obfuscatedIdentifier } = await OdisUtils.Identifier.getObfuscatedIdentifier( userPlaintextIdentifier, OdisUtils.Identifier.IdentifierPrefix.PHONE_NUMBER, issuerAddress, authSigner, serviceContext );
-
Register an attestation mapping between the obfuscated identifier and an account address in the
FederatedAttestations
contract. This attestation is associated under the issuer. See docs for more info.const federatedAttestationsContract = await kit.contracts.getFederatedAttestations(); // upload identifier <-> address mapping to onchain registry await federatedAttestationsContract .registerAttestationAsIssuer( obfuscatedIdentifier, userAccountAddress, attestationVerifiedTime ) .send();
-
Look up the account addresses owned by an identifier, as attested by the issuers that you trust (in this example only your own issuer), by querying the
FederatedAttestations
contract. See docs for more info.const attestations = await federatedAttestationsContract.lookupAttestations( obfuscatedIdentifier, [issuerAddress] ); console.log(attestations.accounts);
Type |
---|
ContractKit |
EthersJS (v5) |
web3.js |
NextJS based web app (Phone Number) |
React Native App (Phone Number) |
NextJS based web app (Twitter) |
Server side NextJS (Twitter) |
The Runtime Environments section shows instructions for using SocialConnect with:
- NodeJS (see Runtime Environments > Node),
- React Native (see Runtime Environments > React Native), and
- Web (see Runtime Environments > Web)
For a deeper dive under the hood and specific implementation details, check out the documentation of the protocol for details on how to interact with the on-chain registry, privacy for how identifiers are obfuscated, and key-setup to setup your role keys to interact with the protocol.
Interested in Integrating SocialConnect, get in touch by filling this form.
SocialConnect is in beta! Help us improve by sharing feedback on your experience in the Github Discussion section. You can also open an issue or a PR directly on this repo.