60 min
Fablabs Course
3.3.2.2 Session: Usage of Digital wallets
Setting up digital wallets (20min)
Ideate phase
Preparation: Students install and configure relevant software to set up a working environment for each wallet type:
- Metamask for browser-based wallet management
- Hardware wallet software (if applicable) for offline storage
- Exchange setup for those using a fully online wallet option
Prototype
- Wallet Setup: Students set up their chosen wallet type and configure it for a basic operation:
- Create or import a wallet and fund it with test cryptocurrency if using a test network.
- Use the wallet to view balances and transfer small amounts between accounts.
- Verification: Each student verifies their wallet setup by sharing their public address with classmates and demonstrating a test transaction (e.g., sending tokens or checking balance) to show functionality and security.
Setting up smart contract communication (40min)
Ideate phase
- Discussion: Students discuss different tools and techniques to interact with Uniswap’s smart contract using their digital wallets.
- Preparation: Students set up their environment based on their chosen interaction method:
- Using Uniswap with Metamask: Set up and connect Metamask to the Uniswap app.
- Using a Blockchain Explorer (e.g., Etherscan): Prepare to interact with Uniswap by locating the contract on Etherscan.
- Running a Local Node: Set up a node and configure the ABI (Application Binary Interface) to enable direct interaction with the Uniswap contract.
Prototype
- Execute a Test Interaction: Each student practices a token swap or similar transaction:
- Metamask & Uniswap: Connect the wallet and initiate a token swap within Uniswap’s app.
- Blockchain Explorer: Locate and interact with Uniswap’s contract by sending a transaction or reading contract data.
- Local Node with ABI: Execute a transaction directly using the ABI interface, viewing the transaction results in the blockchain explorer.
- Verification: Students verify the success of their transaction and reflect on how the interaction method affected security, convenience, and control.
Licenciado baixo a Licenza Creative Commons Atribución Compartir igual 4.0