paint-brush
An In-Depth Guide to IC Programming and Best Practices to Followby@nnsdao
466 reads
466 reads

An In-Depth Guide to IC Programming and Best Practices to Follow

by NnsDAO Labs20mDecember 5th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The integration of Internet Identity (II for short) needs to be distinguished between the development environment and the main network environment. The principals obtained through the II authentication of the main network environment cannot be used in the development environment, and the principals authenticated through the II of the development environment cannot be used in the main network environment.

Company Mentioned

Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - An In-Depth Guide to IC Programming and Best Practices to Follow
NnsDAO Labs HackerNoon profile picture
NnsDAO Labs

NnsDAO Labs

@nnsdao

The boundaryless autonomous organization.

About @nnsdao
LEARN MORE ABOUT @NNSDAO'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

NnsDAO Labs HackerNoon profile picture
NnsDAO Labs@nnsdao
The boundaryless autonomous organization.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite