An In-Depth Guide to IC Programming and Best Practices to Followby@nnsdao
459 reads

An In-Depth Guide to IC Programming and Best Practices to Follow

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

The integration of Internet Identity (II for short) needs to be distinguished between the development environment and the main network environment. The principals obtained through the II authentication of the main network environment cannot be used in the development environment, and the principals authenticated through the II of the development environment cannot be used in the main network environment.

Company Mentioned

Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - An In-Depth Guide to IC Programming and Best Practices to Follow
NnsDAO Labs HackerNoon profile picture

@nnsdao

NnsDAO Labs

The boundaryless autonomous organization.


Receive Stories from @nnsdao

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!