Zipwire Documentation
Visit Zipwire
  • 👋Welcome to Zipwire
  • Overview
    • 💡What is it?
    • 🙋‍♀️Who can use it?
    • ✨Our Features
    • 🚗Can I test drive it?
      • 📦Setting up Zipwire Approve
      • 📥Setting up Zipwire Collect
    • 🔑Logins & Invitations
    • 🐢Zipwire Collect: Rapid Onboarding, Effortless Compliance
    • 💾Data Ownership in Zipwire
  • Zipwire Approve
    • 🏅How Zipwire Approve is radically different and speeds up pay day
    • ⛔Why we don't track start and end times
    • 📦Unboxing key concepts
      • 📜Accounts
      • ⏲️Timesheets
      • 👷Senders
      • 🚦Approvers
      • 👑Processors
      • ⤵️Workflows
      • 🏷️Assignments
      • 📐Billing Plans
      • 💱Rate Plans
      • 📬Teams & Inboxes
      • 🏢Workplaces
      • 🛡️Clients
      • ✍️The Journal
      • 🤸Activities
      • 💸Payment Methods
    • 🔲Logical structure
    • 🛠️Set up your workplace
    • 🚥Processing stages
    • 💵Understanding invoicing
    • 🏷️Using assignments
      • 🏖️Holiday assignment
  • Zipwire Collect
    • 🗄️Effortless Document Collection for Any Need
    • 🟢Get Started
    • 😭IDSP, IDVT, KYC, KYB and AML
      • 🤳Selfie Checks Powered by Yoti
      • ⛓️Blockchain Attestations
    • 📄Using Packs
    • 🤖Machine Vision
      • 🤷Failure to Recognise
      • 🪪Document Types
    • ✍️Manual Entry for Streamlined Information Gathering
    • ✨Creating a Collection with AI
    • 👀What the Respondent Sees at Their End
    • ♻️Lifecycle of a Collection
    • 🚚Bulk Upload
    • 🔍Document Inspection
  • Fundamentals
    • 🛡️Security
      • 📲Authenticator mobile apps
      • 🔐Two factor in Zipwire
      • Wallet Connections
      • Sign-in with Ethereum
      • Attestations
        • The "IsAHuman" Attestation: Purpose and Limitations
        • Zipwire’s Master Attester Wallet Address and Public Key
      • Wallet Verification Guide
        • Introduction to Sleeper Wallets and Blockchain Legends
        • How Sleeper Wallets Are Created
        • Verifying Attested Wallets
        • The Market for Selling and Buying Attested Wallets
        • Holistic Evaluation of Ethereum Wallets
        • The Future of Attestations and Wallet Verification
        • Verifying Zipwire’s Merkle Root Attestations for Developers
      • Understanding Merkle Trees and Proofs
  • Use Cases
    • 🎭Identity Checks - Right to Work
    • 🪪Compliance - Know Your Customer
    • 🎨For Senders
      • 💬Sending journal updates via WhatsApp
      • 🤸‍♂️Naming activities
      • ✍️Tracking time in your Journal
      • ⏲️Send your first timesheet
    • 📱Tracking time via WhatsApp
    • 🖥️For Approvers
      • 💬Approving timesheets via WhatsApp
  • Troubleshooting
    • 🔀Tangled Identities
Powered by GitBook
On this page
  • Overview
  • Components of Evaluation
  • 1. Attestations
  • 2. Blockchain Activity
  • 3. Off-Chain Information
  • Combining On-Chain and Off-Chain Data
  • Why It Matters
  1. Fundamentals
  2. Security
  3. Wallet Verification Guide

Holistic Evaluation of Ethereum Wallets

PreviousThe Market for Selling and Buying Attested WalletsNextThe Future of Attestations and Wallet Verification

Last updated 4 days ago

Overview

Evaluating the trustworthiness of an Ethereum wallet, whether a sleeper wallet or a standard account, requires a comprehensive approach that goes beyond a single attestation. This page provides a framework for assessing wallets by combining attestations, blockchain activity, and off-chain information to ensure informed decision-making.

Components of Evaluation

To holistically evaluate an Ethereum wallet, consider the following components:

1. Attestations

Attestations are verifiable claims about a wallet’s holder, such as identity or reputation. A robust evaluation involves:

  • Multiple Attestations: A wallet with several attestations from trusted sources (e.g., Zipwire’s "IsAHuman" or identity document attestations) is more credible than one with a single attestation.

  • Attester Trustworthiness: Verify the attester’s identity and history using tools like EAS Scan . For example, confirm Zipwire’s master address (0x2651ef3d909828eff9a9bdd6454eb5f98b045e76) hasn’t been compromised.

  • Merkle Proofs: For identity-based attestations, request a Merkle proof to validate specific data (e.g., name or ID number) without exposing sensitive information.

2. Blockchain Activity

A wallet’s transaction history reveals its usage patterns and legitimacy:

  • Consistent Patterns: Genuine wallets often show regular activity, such as sending/receiving tokens, interacting with dApps, or participating in governance. Use block explorers like Etherscan or BaseScan to analyze transactions.

  • Red Flags: Prolonged inactivity followed by sudden bursts of transactions may indicate a sleeper wallet or a compromised account. Similarly, minimal activity beyond attestations suggests a synthetic identity.

  • Diversity of Interactions: Engagement with multiple smart contracts or platforms strengthens confidence in the wallet’s authenticity.

3. Off-Chain Information

External data can provide additional context:

  • Reputation Systems: Check if the wallet is linked to verified profiles on platforms like GitHub, social media, or decentralized identity services.

  • User-Provided Proofs: Request documentation or proofs (e.g., signed messages) from the wallet holder to confirm ownership and intent.

  • Third-Party Verifications: Some platforms or services may offer off-chain KYC checks or reputation scores that complement on-chain data.

Combining On-Chain and Off-Chain Data

A holistic evaluation integrates these components to form a complete picture:

  • Example Scenario 1: A wallet applying for DeFi platform access has an "IsAHuman" attestation from Zipwire, a history of token trades, and a linked GitHub profile. This combination suggests a legitimate user.

  • Example Scenario 2: A wallet with a single attestation, no transaction history, and no off-chain presence raises suspicion of being a synthetic or compromised account.

Cross-reference findings to avoid over-relying on any single data point. For instance, a trusted attestation loses value if the wallet’s transaction history suggests recent compromise.

Why It Matters

Holistic evaluation ensures platforms, developers, and users can trust Ethereum wallets for critical interactions like trading, governance, or service access. By combining attestations, blockchain activity, and off-chain information, you can detect potential sleeper wallets, bots, or fraudulent accounts, enhancing security and reliability in the blockchain ecosystem.

🛡️
https://base.easscan.org/