Skip to content

Latest commit

 

History

History
29 lines (23 loc) · 2.56 KB

README.md

File metadata and controls

29 lines (23 loc) · 2.56 KB

Account

All-in-one EIP-7702 powered delegation contract, coupled with Porto

Every app needs an account, traditionally requiring separate services for auth, payments, and recovery. Doing this in a way that empowers users with control over their funds and their data is the core challenge of the crypto space. While crypto wallets have made great strides, users still face a fragmented experience - juggling private keys, managing account balances across networks, having to install browser extensions, and more.

We believe that unstoppable crypto-powered accounts should be excellent throughout a user's journey:

  • Onboarding: No key management using WebAuthn and Passkeys. KYC-less fiat onramping. No kicking of the user to 3rd party applications, fully embedded experience with headless wallet.
  • Verifying their identity: Privacy-preserving identity verification with ZK Passport or other techniques.
  • Transacting safely: Access control policies baked in with sensible defaults in smart contracts.
  • Transacting privately: Built-in privacy using stealth addresses and confidential transactions.
  • Transacting seamlessly across chains: Single address with automatic gas handling across chains using ERC7683.
  • Recovering their account: Multi-path recovery via social, email, OAuth, or other identity providers.
  • No vendor lock-in: No vendor lock-in, built on top of standards that have powered Ethereum for years.

Features out of the box

  • Secure Login: Using WebAuthN-compatible credentials like PassKeys.
  • Call Batching: Send multiple calls in 1.
  • Gas Sponsorship: Allow anyone to pay for your fees in any ERC20 or ETH.
  • Access Control: Whitelist receivers, function selectors and arguments.
  • Session Keys: Allow transactions without confirmations if they pass low-security access control policies.
  • Multi-factor Authentication: If a call is outside of a certain access control policy, require multiple signatures.
  • Optimized for L2: Using BLS signatures.
  • Chain Abstraction: Transaction on any chain invisibly. Powered by ERC7683. WIP
  • Privacy: Using stealth addresses and confidential transactions.
  • Account Recovery & Identity: Using ZK {Email, OAUth, Passport} and more.