Lit is an internet native security network for signing and encryption. With Lit, you can create and control keys and run code for virtually any application that can be made private, immutable, and / or autonomous.| developer.litprotocol.com
Session signatures work by having scoped capabilities be granted to session keys by an inner AuthSig. The capability object is a SIWE ReCap object.| developer.litprotocol.com
Like other decentralized networks, Lit has a certain amount of computation available for users that's metered to allow for a responsive network with nodes that are able to stay in-sync with one another.| developer.litprotocol.com
Giving private keys or credentials to a server is a massive security responsibility.| developer.litprotocol.com
Wrapped Keys are a secure and flexible key management solution provided by Lit Protocol. They offer a unique approach to handling private keys, combining the security of encryption with the programmability of Lit Actions to offer private key signing to a broader range of blockchain networks.| developer.litprotocol.com
This page defines some basic access control conditions (referred to as accessControlConditions in the code) based on standard contract types like ERC20, ERC721, and ERC1155 for EVM (Ethereum) chains. Also included are some conditions like wallet address ownership, proof of humanity, and POAP possession. You may set your conditions, and define the returnValueTest under which access should be granted.| developer.litprotocol.com
Please do not cache Session Signatures, and instead generate them on-demand.| developer.litprotocol.com
Ensure you have the following requirements in place:| developer.litprotocol.com
Programmable Key Pairs (PKPs) are ECDSA public/private key pairs created by the Lit network using Distributed Key Generation (DKG). Each Lit node holds a share of the private key, and more than two-thirds of these shares must be collected to execute a given action (i.e. signing a transaction).| developer.litprotocol.com
Authentication methods are ways of assigning Programmable Key Pairs (PKP) to a specific account resource. This requires individuals to authenticate before performing operations requiring a PKP. This is a powerful feature of the Lit network as it means users can sign up for a wallet the same way they sign up for other types of digital resources, thus lowering the barrier to accessing web3 enabled applications.| developer.litprotocol.com
Lit Actions are immutable JavaScript programs that run on a decentralized Lit network. They enable powerful, blockchain-agnostic applications with built-in cryptographic capabilities like signing and encryption.| developer.litprotocol.com
Breaking Changes & Important Updates| developer.litprotocol.com
Docusaurus blogging features are powered by the blog plugin.| Lit Protocol Blog
Blog posts support Docusaurus Markdown features, such as MDX.| Lit Protocol Blog
This is the summary of a very long blog post,| Lit Protocol Blog
Test networks are designed for early-stage application development. Storing assets with real world value on these networks is highly discouraged and minted PKPs may be deleted. All test networks may be deprecated in the future.| developer.litprotocol.com
With the release of Chronicle Yellowstone, Chronicle is going to be deprecated, and should no longer be used.| developer.litprotocol.com