Zipwire Documentation
Visit Zipwire
  • 👋Welcome to Zipwire
  • Overview
    • 💡What is it?
    • 🙋‍♀️Who can use it?
    • ✨Our Features
    • 🚗Can I test drive it?
      • 📦Setting up Zipwire Approve
      • 📥Setting up Zipwire Collect
    • 🔑Logins & Invitations
    • 🐢Zipwire Collect: Rapid Onboarding, Effortless Compliance
    • 💾Data Ownership in Zipwire
  • Zipwire Approve
    • 🏅How Zipwire Approve is radically different and speeds up pay day
    • ⛔Why we don't track start and end times
    • 📦Unboxing key concepts
      • 📜Accounts
      • ⏲️Timesheets
      • 👷Senders
      • 🚦Approvers
      • 👑Processors
      • ⤵️Workflows
      • 🏷️Assignments
      • 📐Billing Plans
      • 💱Rate Plans
      • 📬Teams & Inboxes
      • 🏢Workplaces
      • 🛡️Clients
      • ✍️The Journal
      • 🤸Activities
      • 💸Payment Methods
    • 🔲Logical structure
    • 🛠️Set up your workplace
    • 🚥Processing stages
    • 💵Understanding invoicing
    • 🏷️Using assignments
      • 🏖️Holiday assignment
  • Zipwire Collect
    • 🗄️Effortless Document Collection for Any Need
    • 🟢Get Started
    • 😭IDSP, IDVT, KYC, KYB and AML
      • 🤳Selfie Checks Powered by Yoti
      • ⛓️Blockchain Attestations
    • 📄Using Packs
    • 🤖Machine Vision
      • 🤷Failure to Recognise
      • 🪪Document Types
    • ✍️Manual Entry for Streamlined Information Gathering
    • ✨Creating a Collection with AI
    • 👀What the Respondent Sees at Their End
    • ♻️Lifecycle of a Collection
    • 🚚Bulk Upload
    • 🔍Document Inspection
  • Fundamentals
    • 🛡️Security
      • 📲Authenticator mobile apps
      • 🔐Two factor in Zipwire
      • Wallet Connections
      • Sign-in with Ethereum
      • Attestations
        • The "IsAHuman" Attestation: Purpose and Limitations
        • Zipwire’s Master Attester Wallet Address and Public Key
      • Wallet Verification Guide
        • Introduction to Sleeper Wallets and Blockchain Legends
        • How Sleeper Wallets Are Created
        • Verifying Attested Wallets
        • The Market for Selling and Buying Attested Wallets
        • Holistic Evaluation of Ethereum Wallets
        • The Future of Attestations and Wallet Verification
        • Verifying Zipwire’s Merkle Root Attestations for Developers
      • Understanding Merkle Trees and Proofs
  • Use Cases
    • 🎭Identity Checks - Right to Work
    • 🪪Compliance - Know Your Customer
    • 🎨For Senders
      • 💬Sending journal updates via WhatsApp
      • 🤸‍♂️Naming activities
      • ✍️Tracking time in your Journal
      • ⏲️Send your first timesheet
    • 📱Tracking time via WhatsApp
    • 🖥️For Approvers
      • 💬Approving timesheets via WhatsApp
  • Troubleshooting
    • 🔀Tangled Identities
Powered by GitBook
On this page
  • Overview
  • The Creation Process
  • The "IsAHuman" Attestation
  • Limitations
  • Zipwire’s Role in Attestations
  • Security Note
  • Why It Matters
  1. Fundamentals
  2. Security
  3. Wallet Verification Guide

How Sleeper Wallets Are Created

PreviousIntroduction to Sleeper Wallets and Blockchain LegendsNextVerifying Attested Wallets

Last updated 3 days ago

Overview

Sleeper wallets, or blockchain legends, are Ethereum wallet addresses crafted with attestations and activity to appear credible, often for sale as synthetic identities. This page explains how these wallets are created, focusing on the role of attestations and services like Zipwire in establishing their trustworthiness.

The Creation Process

Creating a sleeper wallet involves generating an Ethereum address and building its credibility through attestations and transactions. Here’s how it typically works:

  1. Generate a Wallet: An individual or service creates a new Ethereum wallet address using standard tools like MetaMask or a custom script.

  2. Obtain Attestations: The wallet is linked to attestations—verifiable claims about the wallet holder’s identity or attributes. For example, a service like Zipwire can perform an ID check and issue an attestation to the wallet.

  3. Build Activity: To enhance credibility, the wallet may engage in token transfers, dApp interactions, or other blockchain transactions, creating a history that mimics legitimate use.

  4. Prepare for Sale: Once attested and active, the wallet can be sold to buyers seeking pre-verified identities for immediate use.

The "IsAHuman" Attestation

A good attestation for sleeper wallets is "IsAHuman," issued by services like Zipwire. This attestation is a simple boolean (true or false) indicating whether the wallet holder has passed a human verification check, such as an ID submission. Because it doesn't hold any identity information, someone could pass the ID checks using Zipwire to receive this attestation and then sell or let someone else control the wallet.

Attestations that are tied to a checked identity document help mitigate this, so long as the consuming software asks for a signed and dated 'proof'. See

Limitations

The "IsAHuman" attestation alone is not a definitive proof of humanity. It’s a starting point, and its reliability depends on:

  • Who issued it: The attester must be trusted and secure.

  • When it was issued: Recent attestations reduce the risk of wallet compromise.

  • Additional context: Other attestations or transaction history provide a fuller picture.

Zipwire’s Role in Attestations

Zipwire facilitates wallet attestation by verifying identities and issuing attestations on the Base blockchain. Below are the details of Zipwire’s Master Production Attestation Key, used to issue attestations:

  • Ethereum Address: 0x2651ef3d909828eff9a9bdd6454eb5f98b045e76

  • Public Key: 0x04f585f43d96b93c921d4a9d2307f36a4fe1faea39a3c737a1e228295c3bcbef4813f69674b467de30e67888f1e63c13c0e12e2decd5fd623f08f7ef7959cd4b64

Security Note

Why It Matters

Understanding how sleeper wallets are created highlights the mechanics of attestation and the importance of trusted issuers like Zipwire. However, attestations are only as reliable as their source and context. The next step is verifying these wallets to ensure they haven’t been compromised or misused.

Verification Source: Confirm these details on Zipwire’s GitHub:

These details could be altered if a hacker compromises Zipwire’s documentation. To ensure authenticity, cross-reference the GitHub source and check the attestation history on the Base blockchain using EAS Scan: . Search for Zipwire’s master address to verify its activity.

🛡️
Understanding Merkle Trees and Proofs.
https://github.com/zipwireapp/zipwireapp/blob/master/PUBLICKEYS.md
https://base.easscan.org/