TLSNotary Workshop DefCon 2025
This blog post contains the instructions for the TLSNotary workshop we present at DefCon 2025. The workshop aims to introduce participants to TLSNotary, covering its use in both native Rust and browser environments.
We are publishing these instructions beforehand so you can prepare (see Pre-Workshop Setup), and they are also very useful for people who can't attend in person.
Introduction
This workshop introduces you to TLSNotary, both in native Rust and in the browser.
Workshop Objectives:
- Understand the applications of TLSNotary.
- Learn the basics of attesting, proving, and verifying data using TLSNotary.
- Build your own TLSNotary plugins to attest to data from new data sources.
Pre-Workshop Setup
To avoid network issues on conference Wi-Fi, please download the following dependencies in advance:
- Clone repositories, get dependencies and build code
Note that this requires the Rust and NPM toolchains.
# Clone Git Repositories:
git clone -b v0.1.0-alpha.12 https://github.com/tlsnotary/tlsn
git clone -b v0.1.0-alpha.12 https://github.com/tlsnotary/tlsn-js
git clone https://github.com/tlsnotary/tlsn-plugin-boilerplate
# Install websocket proxy
cargo install wstcp
# Build rust code (and download dependencies)
cargo build --manifest-path tlsn/Cargo.toml --release --examples
# Install [Extism-js](https://github.com/extism/js-pdk)
curl https://raw.githubusercontent.com/extism/js-pdk/main/install.sh -s | bash
# Build Javascript code (and download dependencies)
npm install --prefix tlsn-js
npm run build --prefix tlsn-js
npm install --prefix tlsn-plugin-boilerplate
npm run build --prefix tlsn-plugin-boilerplate build
You may need to runrustup update
if your Rust installation is out of date. - Install the TLSNotary Browser Plugin from the Chrome Web Store
Getting Started
In the first part of the workshop, we’ll begin with the basics. To keep things simple, we’ll use a local, single-computer setup wherever possible.
Rust: Interactive Verification without a Trusted Notary
We’ll start by running the most basic TLSNotary setup.
We’ll run a local test server ("tlsn-server-fixture") that serves the Prover JSON or HTML content. The Prover and Verifier will fetch this data via MPC, allowing the Prover to reveal parts of the JSON to the Verifier, who then verifies it.
We call this setup Interactive Verification.
🚀 The first examples use Rust. If you’re not a Rust dev, don’t worry—you don’t need to write Rust code yourself. 😇
Source Code
The source code is located at crates/examples/interactive/interactive.rs
in the tlsn
repository.
The setup has three main parts:
main()
: wires everything together.prover(...)
:- Connects to the Verifier.
- Connects to the TLS Server.
- Performs MPC-TLS handshake.
- Sends a request to the Server and waits for the response.
- Redacts/reveals data and creates a proof for the Verifier.
verifier(...)
:- Verifies MPC-TLS and waits for (redacted) data.
- Verifies disclosed data (hostname, content).
Start the Server
PORT=4000 cargo run --release --bin tlsn-server-fixture
Run the Example
To run the interactive example:
SERVER_PORT=4000 cargo run --release --example interactive
Expected log:
Successfully verified https://test-server.io:4000/formats/html
Verified sent data:
GET https://test-server.io:4000/formats/html HTTP/1.1
host: test-server.io
connection: close
secret: 🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈🙈
...
For more detailed debug information:
RUST_LOG=debug,yamux=info,uid_mux=info SERVER_PORT=4000 cargo run --release --example interactive
ℹ️ Note: We run in
release
mode becausedebug
mode is too slow to complete the TLS session before it times out.
Extra Tasks (optional)
- Experiment with different redactions.
- Try proving JSON content instead (
/formats/json
end of the server fixture).
Rust: Notarize with a Trusted Notary
Next, we’ll run the TLSNotary protocol with a Notary server blindly verifying the TLS session and returning a signed attestation.
Leave the test server ("tlsn-server-fixture") running.
Start a local notary server:
cargo run --release --bin notary-server
The process has three steps:
- Notarize a request and response from the test server and obtain an attestation.
- Create a redacted, verifiable presentation from the attestation.
- Verify the presentation.
We use the term presentation as defined in W3 Verifiable Credentials.
1. Notarize
Next create a presentation with:
SERVER_PORT=4000 cargo run --release --example attestation_prove
This notarizes a request and json
-response from the test server and acquires an attestation. The result is written to two files: an attestation and the MPC secrets. In the next step the Prover can use these two files to create different presentations for the Verifier to verify.
2. Create Presentation
cargo run --release --example attestation_present
In crates/examples/attestation/present.rs
, inspect how certain content is revealed or concealed.
3. Verify
Finally the verifier can verify the presentation:
cargo run --release --example attestation_verify
This will verify the presentation and print the disclosed data to the console.
Note that in a real world scenario, the Prover would send the Presentation to the Verifier, here we just used the filesystem.
Extra tasks (optional)
Try the above steps with different types of web content:
- HTML: Append
-- html
to the commands for each of the steps - Authenticated content: Append
-- authenticated
to the commands for each of the steps. (This will add an authentication token to the request to access 'private' data). - Team work: team up with your neighbors and distribute roles: Server, Prover, Verifier and Notary. Can you make it work? Make sure to open the required ports on your firewall.
- Notarize with a Trusted Notary: Distribute the roles and make sure to configure
NOTARY_HOST
,NOTARY_PORT
,SERVER_HOST
andSERVER_PORT
to the correct values. Check/crates/examples/attestation/prove.rs
for the details. - Interactive verifier: For the interactive verifier you can use the interactive verifier demo from the https://github.com/tlsnotary/tlsn-js repo. The demo is in the
demo/interactive-demo
folder.- One team member starts the Verifier:
cd interactive-demo/verifier-rs; cargo run --release
- And another team member runs the Prover. Make sure to configure the correct
VERIFIER_HOST
first:cd interactive-demo/prover-rs; cargo run --release
- One team member starts the Verifier:
- Check that the Verifier is not talking to the TLS server
- Check that the Verifier only sees what the prover wants to disclose.
- Try to make it break
- Notarize with a Trusted Notary: Distribute the roles and make sure to configure
TLSNotary in the Browser: notarize with the Browser extension
Good job. Now that you have a better understanding of what is going on under the hood: Let's try TLSNotary in the Browser with our Browser Extension.
Why the browser, you ask? That is the natural place to interact with the web, and where the cookies and headers are to send the correct request to get private data attested. It is also the natural UI for your end users to log in. Other platforms (e.g. mobile) are also possible, we don't offer an out of the box solution yet.
Why use the browser? The browser is the most natural place to interact with web applications. The browser provides a familiar user interface for end users to log in and manage their accounts. It also has access to cookies and headers, allowing you to send the correct requests to attest private data. While other platforms (such as mobile) are possible, we currently do not offer an out-of-the-box solution for them.
Configuration
Running the TLSNotary protocol in the Browser needs something special. Browser extensions can not open TCP connections, and this is required to connect the Prover to the Server. So to run the Prover in a browser we need a workaround: a websocket proxy.
The easiest way to run a local websocket proxy is to use wstcp
:
wstcp --bind-addr 127.0.0.1:55688 api.x.com:443
This command allows the browser to setup a TCP connection to api.x.com
by talking to the websocket at port 55688
.
Next we need to configure the Browser Extension options to use websocket proxy. We will also configure the extension to use the local notary and enable developer mode.
🛠️ If you did not install the extension yet, Install the TLSNotary Browser Plugin from the Chrome Web Store
- Click the extensions button (🧩) next to the address bar, and click "TLSN Extension"
- Click the hamburger menu (☰) in top right in the extension,
- select Options
- and make following changes:
- Notary API: You could keep the default, this will use PSE's development notary server, but to avoid network delays, we recommend to configure a local notary server instead. (Double check the notary is still running): use
http://localhost:7047
ℹ️ You can also use the proxy server hosted by PSE. Note that this proxy server only supports a limited list of whitelisted domains. If you want to access other domains, you will need to run your own proxy server.
Notarize
We will start with running a local plugin, either the Twitter or Discord plugin.
Click the extensions button (🧩) next to the address bar, and click TLSN Extension > Plugins and click the plugin you want to run; you can either try the Twitter or Discord plugin.
ℹ️ If you don't see the Plugins tab, make sure you enabled "Developer mode" in the options.
Next follow the steps in TLSNotary sidebar.
If everything works correctly, you should and up with a valid presentation. Click the View button to check the verified presentation. You can also verify past notarize requests in the History tab of the extension.
Building apps with TLSNotary
👍 Good job! We are progressing nicely and learning a lot.
The next topic is building web applications that use TLSNotary attestations.
First we will test a demonstration webapp that uses the browser extension to request an attestation of the user's Twitter profile.
Finally we will build this plugin ourselves.
Browser extension Connection API
Next topic is exploring a web application that verifies that you have a Twitter account and rewards you with a POAP if you do.
Visit https://demo.tlsnotary.org and walk through the steps.
You can verify what the web app is doing by reading the source code at https://github.com/tlsnotary/tlsn-plugin-demo.
You can find more information on the Provider API in our documentation.
⚠️ Note: This demo allows for proving with any notary (so that you can use local notary to avoid stressing the network). In real world applications, please verify the attestation more carefully to make sure the attestations you receive are trustworthy.
Browser extension plugins
git clone https://github.com/tlsnotary/tlsn-plugin-boilerplate
npm i
npm run build
After you run the above commands, the dist
folder should now contain a twitter_profile.tlsn.wasm
file. This is a plugin that can be loaded in the Extension.
Load the plugin via the Connection API
You can host a simple web page to easily test the plugin:
- Run
npm run serve-demo
- Open http://localhost:8080
- Click accept. This action opens the Twitter webpage along with a TLSNotary sidebar.
- Follow the steps in the TLSNotary sidebar.
- Close the Twitter tab, but don't close the sidebar.
- Access the TLSNotary results by clicking the History button in the TLSNotary extension.
Alternatively, you can also install the plugin in the extension (note that this requires Developer mode on
). To avoid confusion, it is recommended to remove the existing Twitter plugin before adding the freshly built plugin into the extension. Hover over the plugin and click the red cross in the top right of the extension. Next, click Add plugin and select the twitter_profile.tlsn.wasm
file in the dist
folder.
Now you can run the plugin by clicking it in the extension and following the steps in the sidebar.
You can find more information at https://docs.tlsnotary.org/extension/plugins.html
Feel free to inspect the source code of the Twitter plugin. Two files are especially important. Make sure you check config.json
(the configuration) and index.ts
(the implementation of the plugin steps). Make sure to check the part where the request is prepared with cookies and headers logged by your browser.
ℹ️ Note: Because we use Extism to build the TLSNotary Extension plugins, you can also write plugins in Rust. See https://github.com/tlsnotary/tlsn-plugin-boilerplate/tree/main/examples/twitter_profile_rs for an example.
Play Time
You now have experimented with the basic building blocks. Next step is to build your own applications with TLSNotary.
Think of what Web2 data you'd like to unlock: Private message, identity providers, reputation sources, financial information, ... Build a custom plugin or develop a complete webapp with TLSNotary.