Web3Keys Playground
Explore SmartLedger BSV (security-hardened): generate/import mnemonics, derive keys, sign/verify, hash data, and encrypt/decrypt — all client-side with zero vulnerabilities.
Step 1: Generate or Import Keys
Sensitive (WIF / PrivateKey) – click to reveal
Derivation Playground
Message Signing & Verification
Encrypt / Decrypt (Password-based)
Hash Utilities
Backup / Restore (Local)
Create an encrypted JSON bundle containing your mnemonic and current identity WIF. Keep your password safe; it cannot be recovered.
Optional Server Backup (Non-custodial)
Option A: split your identity WIF into Shamir shares and upload one share to the server. Option B: encrypt a full backup client-side and upload it (server can’t decrypt without your password).
Developer view (share metadata)
Recovery (Fetch server-held backup)
Request a one-time code via email, then fetch the server-held backup. For Shamir recovery you must also provide one of your offline recovery shares. Reconstruction happens locally in your browser.
Verified Chat (ECIES + Credentials)
Prototype: two users exchange public keys and send encrypted messages using bsv.ECIES. An issuer signs a minimal “Active” credential (demo VC-like) that the recipient verifies before trusting the sender.
Optional: VC‑JWT (University-issued)
Optional: VC‑JWT (University-issued)
Developer view (envelopes + verification)
Document Signing (DocuSign-like)
Upload a PDF (or any file), hash it, sign the hash with your identity key locally, and generate a compact on-chain commitment payload (OP_RETURN). Broadcasting is optional and can be done via your preferred infrastructure.
Developer notes
Notarization options: 1) Off-chain: store signature + hash (recommended). 2) On-chain: broadcast a tx that includes the OP_RETURN output. This playground can broadcast via WhatsOnChain, signing locally. Server remains non-custodial: it should never receive WIF/mnemonic.
Identity & Verifiable Credentials (VC‑JWT)
Store VC‑JWTs in your wallet and verify them locally against a pinned issuer JWKS (or fetch from your issuer server). This enables “Verified Faculty/Student/Resident” identity claims without custodial accounts.
Stored credentials (local)
Assets & Tokens (LTP Prototype)
Prototype “Legal Tokens” using SmartLedger’s Legal Token Protocol (LTP). This is a client-side demo: it prepares legally interpretable token objects and anchors their commitment hashes on-chain via OP_RETURN.
Developer notes
This tab demonstrates LTP *preparation + anchoring*. LTP produces legally interpretable token objects plus a commitment hash. We anchor the commitment via an OP_RETURN transaction (broadcast via WhatsOnChain). This is not a full token indexer/registry; ownership/balance tracking is local-only in this prototype.
Debug
CDN createHmac Issue Information
If you're seeing "createHmac is not a function" errors, this is because the CDN version uses Node.js crypto modules that don't exist in browsers.
Solution: The CDN bundles need browser-compatible PBKDF2 implementation using BSV's crypto modules instead of Node.js crypto.