Learn

learn.

the fundamental building blocks of Web3.

The Bitcoin Whitepaper

New Directions in Cryptography

A Primer on Blockchains

The Meaning of Decentralization

An Overview of Ethereum Smart Contracts

An Introduction to Cryptography on Ethereum

An Introduction to ECDSA and Bitcoin

An Overview of Public Key Cryptography

Before Bitcoin – The Public Key Saga

An Introduction to Encryption

Digital Signatures

build with Lit.

create automated agents for digital assets and experiences.

Lit Developer Docs

Lit JavaScript SDK

Getting Started with the SDK

Grants for Open-Source Development

Ecosystem RFPs

Error Handling

guides and demos

example code to get you started.

Lit x Alchemy Guide: Learn how to use Lit PKPs as a signer on Alchemy's Account Kit.

Lit x Pimlico Guide: Use Lit to enable seamless onboarding for Pimlico smart accounts.

Lit x Openfort Guide: Learn how to use Lit PKPs as a signer on Openfort smart accounts.

Lit x Irys Guide – Use Lit to encrypt data before storing it on-chain with Irys.

Lit x Ceramic Guide – Learn how to store encrypted data on ComposeDB.

Conditional Signing with Lit Actions

Returning a Signed API Response with Lit Actions

Zora’s Metabolism Hackathon Private Data Workshop

Cask x Lit Protocol – Money flow automation protocol

Token Gate a Next.js Page by Nader Dabit

Control a Tesla with an NFT

Gated React App – Lock dynamic content behind a JWT issued by the Lit Network.

Lit Protocol x Cloudflare – Gate a video or livestream using Lit and Cloudflare.

Token-gated Shopify

ACL Smart Contract – Create a flexible and powerful authorization system.

Ceramic Signer – Sign Ceramic transactions with a PKP using Lit Actions.

Working with Lit Actions – Examples to get you started.

Working with Access Control Conditions – Some basic examples to get you started.

media.

explore Lit in the media.

Signing Cosmos Transactions with PKPs

Cross-Chain Atomic Bridging

Creating a Wallet with Google oAuth

Programmable Key Pairs

Data Ownership in Web3

The Road to Data Sovereignty

Introduction to Decentralized Access Control