 I'm Tiwo, and I work for Pari Technologies, and today I'll talk about Pari Designer. I'll be super quick at the beginning of the presentation because these are things you probably know, and I'll be much slower at the end. So let's go to the basics, talk about the basics. How do we go from a message to an executed transaction on the blockchain? So you have a message, a beta transaction, you sign it with your private key, and then you send it somehow to the blockchain. This private key is the key point, right? If you lose it, or someone gets access to it, that's game over. So whether people stole their private key, most of the time, or sometimes back in the days, it was securely encrypted on a JSON, for instance. We are a password. You could use it on micro-words, for instance, but the thing is you have to give kind of your private key because you upload this JSON and then you give, sorry, give you a password. So the problem is if my API wanted to get hacked, because it's a website, it's actually kind of a large security threat, well, then game over. What you could do is, and that's much better because MetaMask is not exactly a software on your computer and it's not exactly a website if you use MetaMask. And in the end, that's kind of the same, right? You can give your private key to MetaMask and MetaMask for some reason gets hacked, your PC gets hacked because the extension can be, you know, they are just updated automatically or we were talking about it, but the dependency of MetaMask is hacked then, basically you are game over again. So what you could do again is use, for instance, my crypto operator, which is a desktop application, but in the end, you can still give your private key to those things and those softwares and even if this is on desktop and it's maybe a bit harder to get hacked on your desktop, if the whole, let's say, Windows or Linux or Mac gets hacked then, you're game over again. So what people do to have kind of the highest security today or one of the highest security wire being able to use a private key because high security is just, you know, take your mnemonic and put it somewhere super, super safe, it's just you cannot use it anymore, right, so it doesn't make sense. So people use, for instance, a treasure and they use it together with an online application. So in the middle, there's Feather and you create a transaction with this online software, you send it to the hardware wallet, you sign it from the hardware wallet and then you send it to the blockchain that verifies the signature. So if this guy gets hacked, it will eventually send a hack transaction, but here you can check it right on the treasure and on the hardware wallet and that's where things just stop. What could eventually happen is that the transaction that is sent perfectly okay, you're gonna just, you know, sign it and then they somehow try to trick or change the message. As you probably know, this doesn't work right because you cannot change the message that hasn't been signed without the blockchain rejected. So the more key is this piece of hardware, we'll have the key, we'll sign and this is the key part, right? You want to get this guy super safe. So we thought, wouldn't it be cool if there was enough that could turn an old smartphone into a hardware wallet because everybody, many people have an old smartphone, right? That is laying around, they're not using it and while the whole point is you wanna have, you know, a hardware wallet, sorry, a phone that is offline and you wanna have a way to sign your transaction offline, we could use a phone and sign QR codes to that. So that's why we created early signer. So this is how it looks like and what does it do? You can create accounts, you can recover accounts, you can sign transaction, you can sign messages offline. So this is supposed to be offline all the time. So it's maybe not the latest Samsung, it's gonna be your old phone, right? But it's the same. You should not use your smartphone that you use every day, you should factory reset it, you should encrypt it, you should turn on and play mode and never turn it on again and never plug it into a computer. So how does it work? I have a little demo on the right, I have a feather on the left, I have a pair of signer with an offline phone. So what I do is I create an account, for instance, on Ethereum. And so yeah, I can choose from different accounts, I can choose from different identity cards. That's pretty fun. Let's have a look. Well, here there's one that looks like a little fox, so that's pretty cool, I'm gonna pick this one and I'm gonna give it a name, et cetera. On the right again, this is on the right, there's a synced wallet that is offline and ready to send some transactions. So on the left I gave, I created an account, so I'm demonic, I put a pin, of course, because you want to secure it somehow, someone gets hold of your phone that is offline. And on the right, what I'm gonna do is I'm gonna import this account that has been created offline. So I can just scan a QR code, the left I'm gonna show this QR code to my PC basically, to the webcam of the PC. Just give the name right, no need to sign to put any password or whatever because anyway, it's on the phone that is offline. Now I've sent already some money to this account and I'm just gonna show you how we're gonna send money from the account. So now from this account that is offline, I will send money to another account. So I'm gonna show you how to sign a transaction. So from the account that is offline, just gonna say scan and this on the right is the transaction that needs to be signed, right? It's hasn't been signed. So on the left, on the offline, I'm gonna scan this transaction from my PC. Then I'm gonna review it on a nice screen that is a smart phone screen, right? So it's pretty nice, I can see everything. I can just sign it by typing my pin. And then I'm gonna show the signed transaction. So on the left, it's the signed transaction that I'm just gonna, one super quick, but just gonna scan with my webcam. And that's it, right? So behind this scene, which we didn't react needed, we have a cryptographic libraries written in Rust, and everything's made to work offline so you will not never get online with your phone. The private key never goes to the internet. Just to be super clear, if you have millions of euros or just don't use this. What's next? We wanna use pyro metric encryption dynamic network. We can talk about it. You can get it on the App Store, on the Android, or we have an ITK, an ITK on GitHub. Thank you very much. Thank you.