-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Application flow #1
Comments
This process could be simplified by reversing the order of signing. This gives the check in process: Checking in:
|
Closing this as the information has been moved to the wiki/guide |
This auto check-in model works on a modified versions of the POAP protocol with some minor changes
Setup:
signer
. They enter an event contract address (event_addr
) and a private key which is listed as an admin for that address (admin_pk
) (This private key does not need funds and can be set up before and burnt after the event)signer
will make a call to theserver
passing its local ip address (local_ip
) andevent_addr
which are signed by theadmin_pk
.server
verifiesadmin_pk
against the event contract to check its admin status. If it is an admin then it updates a record on the backend withlocal_ip
.The signer is now ready to accept check-ins
Checking in:
signer
.kickback.events/event/[event_addr]
and presses a "check in" buttonserver
which directs the user tolocal_ip
.user_addr
) andevent_addr
tosigner
and receives them back along with thesigner
's signature (event_sig
)server
server
then verifies both of these signatures (meanwhile checkinguser_addr
has registered for the event andadmin_pk
is actually an admin) and if the proofs are valid, stores it in the backend.The fact that this message has been signed by both parties proves that the user and admin have met. (Attacks described below)
After event:
kickback.events/event/[event_addr]/admin
where they can query the received attendance proofs.Strengths:
Weaknesses:
signer
could allow non-attending users to gain proof of attendance. (Same as currently)signer
and passing the response back to the user to be signed and submitted. Could maybe be mitigated with a TOTP solution al a NukeManDan's solutionNotes:
server
needn't storelocal_ip
if the event organiser uses a simple qr code to direct the users to this address. (however it is needed for a check in button on the website)server
can be removed entirely by allowing users to directly submit proofs to the event contract.The text was updated successfully, but these errors were encountered: