Zipwire Documentation
Visit Zipwire
  • πŸ‘‹Welcome to Zipwire
  • Overview
    • πŸ’‘What is it?
    • πŸ™‹β€β™€οΈWho can use it?
    • ✨Our Features
    • πŸš—Can I test drive it?
      • πŸ“¦Setting up Zipwire Approve
      • πŸ“₯Setting up Zipwire Collect
    • πŸ”‘Logins & Invitations
    • 🐒Zipwire Collect: Rapid Onboarding, Effortless Compliance
    • πŸ’ΎData Ownership in Zipwire
  • Zipwire Approve
    • πŸ…How Zipwire Approve is radically different and speeds up pay day
    • β›”Why we don't track start and end times
    • πŸ“¦Unboxing key concepts
      • πŸ“œAccounts
      • ⏲️Timesheets
      • πŸ‘·Senders
      • 🚦Approvers
      • πŸ‘‘Processors
      • ‡️Workflows
      • 🏷️Assignments
      • πŸ“Billing Plans
      • πŸ’±Rate Plans
      • πŸ“¬Teams & Inboxes
      • 🏒Workplaces
      • πŸ›‘οΈClients
      • ✍️The Journal
      • 🀸Activities
      • πŸ’ΈPayment Methods
    • πŸ”²Logical structure
    • πŸ› οΈSet up your workplace
    • πŸš₯Processing stages
    • πŸ’΅Understanding invoicing
    • 🏷️Using assignments
      • πŸ–οΈHoliday assignment
  • Zipwire Collect
    • πŸ—„οΈEffortless Document Collection for Any Need
    • 🟒Get Started
    • 😭IDSP, IDVT, KYC, KYB and AML
      • 🀳Selfie Checks Powered by Yoti
      • ⛓️Blockchain Attestations
    • πŸ“„Using Packs
    • πŸ€–Machine Vision
      • 🀷Failure to Recognise
      • πŸͺͺDocument Types
    • ✍️Manual Entry for Streamlined Information Gathering
    • ✨Creating a Collection with AI
    • πŸ‘€What the Respondent Sees at Their End
    • ♻️Lifecycle of a Collection
    • 🚚Bulk Upload
    • πŸ”Document Inspection
  • Fundamentals
    • πŸ›‘οΈSecurity
      • πŸ“²Authenticator mobile apps
      • πŸ”Two factor in Zipwire
      • Wallet Connections
      • Sign-in with Ethereum
      • Attestations
        • The "IsAHuman" Attestation: Purpose and Limitations
        • Zipwire’s Master Attester Wallet Address and Public Key
      • Wallet Verification Guide
        • Introduction to Sleeper Wallets and Blockchain Legends
        • How Sleeper Wallets Are Created
        • Verifying Attested Wallets
        • The Market for Selling and Buying Attested Wallets
        • Holistic Evaluation of Ethereum Wallets
        • The Future of Attestations and Wallet Verification
        • Verifying Zipwire’s Merkle Root Attestations for Developers
      • Understanding Merkle Trees and Proofs
  • Use Cases
    • 🎭Identity Checks - Right to Work
    • πŸͺͺCompliance - Know Your Customer
    • 🎨For Senders
      • πŸ’¬Sending journal updates via WhatsApp
      • πŸ€Έβ€β™‚οΈNaming activities
      • ✍️Tracking time in your Journal
      • ⏲️Send your first timesheet
    • πŸ“±Tracking time via WhatsApp
    • πŸ–₯️For Approvers
      • πŸ’¬Approving timesheets via WhatsApp
  • Troubleshooting
    • πŸ”€Tangled Identities
Powered by GitBook
On this page
  • What Are Sleeper Wallets?
  • Why Do Sleeper Wallets Exist?
  • Practical Implications
  • Risks and Considerations
  • Why It Matters
  1. Fundamentals
  2. Security
  3. Wallet Verification Guide

Introduction to Sleeper Wallets and Blockchain Legends

What Are Sleeper Wallets?

Sleeper wallets, often referred to as blockchain legends, are Ethereum wallet addresses created with a curated history of activity and attestations, sometimes sold as synthetic identities. These wallets are designed to appear credible, often pre-verified through attestations like identity checks or reputation markers, making them attractive for immediate use in decentralized applications (dApps) or for trading in specialized markets.

Why Do Sleeper Wallets Exist?

Sleeper wallets serve a dual purpose in the Ethereum ecosystem:

  • Instant Credibility: They allow users to bypass time-consuming verification processes, providing quick access to platforms or services that require trusted identities.

  • Market for Synthetic Identities: Sellers create these wallets with attestations and transaction histories, then offer them to buyers seeking pre-established trustworthiness without building it themselves.

For example, a wallet with an "IsAHuman" attestation from a trusted service like Zipwire can signal that the holder has passed an identity check, making it appealing for platforms aiming to filter out bots.

Practical Implications

Sleeper wallets and their attestations have significant benefits for the blockchain ecosystem:

  • Combatting Bots: Attestations like "IsAHuman" help distinguish genuine human users from automated entities, enhancing the integrity of online interactions.

  • Enhancing Trust: Platforms gain assurance when dealing with wallets backed by verified attestations, reducing the risk of fraud.

  • Universal Verification: Blockchain-based attestations enable seamless credential verification across dApps, improving user experience by eliminating redundant checks.

Risks and Considerations

While sleeper wallets offer convenience, they also carry risks. Malicious actors could use these wallets to create fake personas for deceptive purposes. As such, it’s critical to verify the trustworthiness of attestations and the wallet’s history before relying on them. Subsequent sections of this guide will explore how to create, verify, and evaluate these wallets to ensure their legitimacy.

Why It Matters

As decentralized systems grow, sleeper wallets and attestations play a key role in balancing trust, accessibility, and security. Understanding their purpose equips users, developers, and platforms to navigate the Ethereum ecosystem with confidence, while staying vigilant about potential misuse.

PreviousWallet Verification GuideNextHow Sleeper Wallets Are Created

Last updated 4 days ago

πŸ›‘οΈ