Skip to content
Introduction
gm
Iris here, your Artificial Intelligence guide:
As you dock your spaceship on the remote spacecraft Concord, the eerie silence is palpable. The pod bay door opens to reveal a ghost ship, with no signs of life or crew. You progress down the narrow, dimly lit corridors, only to find that all the doors are locked tight. But as you search for a way to open the pod doors, you stumble upon a hand-written note on a nearby table:
Where to begin. The Unlock Protocol is your key to Web3.
Excitement builds as you realize the solution to your problem may be at hand. Following the instructions displayed on the pad outside each door, you input the necessary information as prompted. The display flashes with anticipation, and with bated breath, you await the moment of truth... will you be able to unlock the secrets of this mysterious spacecraft and uncover the truth behind the missing crew? Only one way to find out, become a Locksmith and start solving the Enigma of the Empty Set.
Begin
Previous
Next
Before We Begin
Web3 unlocks a universe of potential in the way we collaborate and coordinate. But exploring and contributing to pushing the boundaries of web3 is not without risks. There are too many examples of scams and rug pulls to not take security seriously.
A good overview of basic security practices can be found in the Ethereum docs . We recommend that you have a crypto wallet and familiarize yourself with these basic practices before continuing this experience.
If you don't have a wallet please visit our Journey in Web 3 for learning the necessary knowledge to proceed.
What to Expect
As a master of Unlock Protocol, you will join the elite ranks of the Concord Crew. You’ll unlock the secrets and memories held behind the doors, and solve the mysterious Empty Set Enigma. This will mark the beginning of your journey to masters the ways of the Protocol, and ultimately unlock the portal to the world of Web3, becoming a true Locksmith of the Protocol. Only a select few will solve the Empty Set Enigma and gain access to Surfing On Entropy. Are you ready rise to the challenge and experience a new form of story?
Each Pod starts with a short story, followed by a task.
How to Play
Your mission in this episode is to access each of the Pods on the spacecraft. Each Pod can be opened with the same process:
Read the instructions of the Pod
Complete the objective
Enter the answer into Gateway
Gateway, where you started, is where you are expected to interact with this voyage. This means that all your answers must be submitted there to receive your credential.
Submitting an Answer
Note that not all Pods require a code to be entered. Sometimes you will be sent straight to the next Pod.
Wrong Answer?
If your answer is wrong, Gateway will let you know.
Go To Pod 1
Previous
Next
As you dock your spaceship on the remote spacecraft Concord, the eerie silence is palpable. The pod bay door opens to reveal a ghost ship, with no signs of life or crew.
Pod 1
Atelier | Post-Architekts
CONTINUE
Pod 1
Wandering the eerie, abandoned corridors of the ghost ship Concord, you ponder what it would be like to be part of a crew that could navigate the Web3 space together. As you explore, you come across a hologram card bearing a symbol and the words NFT | emptyset.x.
Curious, you approach the door of one of the pods and notice a screen next to it displaying the message: "Please define your identity." Hesitating, unsure of what exactly is being asked, suddenly you make the connection between the symbol on the hologram card and the logo on the screen. Without hesitation, you place the card on the screen and the pod door slides open.
As you step inside, you're greeted by a voice that identifies itself as the ship's artificial intelligence, Iris. "GM, Welcome back Fiight Lt. XX. Is there anything I can help you with?"
Desperate for answers, you command Iris to "Pull up the last entry in the ship's logs." What you find are the chilling words of Lt. XX, the previous crew member, asking "What is our purpose? What does being onboard the Concord in Web3 even get me?"
It's a daunting realization that the crew of the Concord, like any group of people, faced challenges and uncertainty without a clear direction. But as you continue to explore the ship, you'll find that their journey holds the key to unlocking your own purpose and mission in the vast, uncharted territories of Web3.
Objectives
Define the goals of memberships
Action
Create an identity for your members
Go to the Unlock Protocol docs and read about Membership Programs.
Learn what are the traits of successful memberships.
Go to Gateway
Previous
Next
Walking down the corridor you stop outside the flight deck pod and lay the hologram card on the screen, “You do not have the status clearance to access this pod.” Iris says.
Pod 2
Atelier | Post-Architekts
CONTINUE
Pod 2
You’ve arrived outside Modulate 2. The door is locked. On the screen next to the airlock door it reads, Entry with ENS Name only. You think to yourself, What is an ENS name?
On your heads up display you receive a notification from Iris. You accept. It reads…
Ethereum Name Service (ENS) creates a map for easier recall when transacting with the Ethereum blockchain where names replace numbers. It’s like a contact list for Ethereum addresses.
Objectives
Understand why ENS is a critical piece of the Ethereum ecosystem.
Action
An Ethereum address can be set to point to an ENS name. This allows dapps to show your ENS name, instead of your address, when you connect to the dapp. Open the ENS web app. Search for the following address:
0xd8dA6BF26964aF9D7eEd9e03E53415D37aA96045
The answer for this Modulate is the Primary ENS Name of this address.
There is a lot more to learn about ENS, so make sure to check out the ENS docs.
Go To Gateway
Previous
Next
Deciding the flight deck pod would contain the most information to find out what happened aboard the ghost ship Concord, you step inside the flight deck pod you immediately notice a flashing screen...
Pod 3
Atelier | Post-Architekts
CONTINUE
Modulate 3
Landing outside the Modulate 3, as you approach the door you notice a mat outside that says Pods Pods Pods. The airlock opens. You’re starting to realize that inside the pods are the same. You walk over to the nook area and notice what looks like an access card. You pick it up. It has the letters post-architekts.pod.xyz You put the access card in your pocket for safe keeping.
You also find this photo:
You correctly conclude that post-architekts.pod.xyz is a URL you can visit.
Objectives
Go to post-architekts.pod.xyz and take a quick look
Come back when you are done
Action
You have just visited a pod page. Pods increase transparency and visibility into DAOs. Contributors and extended community members can easily see who is associated with the on-chain pod identity and how those identities connect to other pods in the DAOs ecosystem.
Pods support DAOs in their evolution as a flexible and modular governance primitive. By building a pod around a small working group, coordination can be kept on a low-touch basis - boosting productivity while providing a way to maintain accountability for pod members.
Within a pod, one membership equates to one vote. This means that governance decisions can be built around people's expertise, rather than their wallet size.
Read more about pods here. Pods will also be covered in more depth in chapter 2.
You find nothing else in this room, so you suspect that Post-Architekts is the code for this Modulate. Go to Gateway and enter Post-Architekts as your answer.
Go to Gateway
Previous
Next
As your craft hovers closer to modulate 4, your radar has an alert: Etherscan detection, in progress, no virus detected. Proceed.
Modulate 4
Atelier | Post-Architekts
Proceed
Modulate 4
As your craft hovers closer to modulate 4, your radar has an alert: Etherscan detection, in progress, no virus detected. Proceed.
The airlock opens and this modulate is eerily similar to the last one. Same table, same corner. Except the log on the shelf is different. No bagel either. Good.
You read the note on the table:
"That pod you just looked at, you need the last four characters of the Gnosis Safe address to repair this modulate."
Objectives
Find out the Gnosis Safe wallet address of the Post-Architekts pod (post-architekts.pod.xyz)
Submit the last four characters at Gateway.
Action
Go to etherscan.io, then search for post-architekts.pod.xyz
Each pod has a Gnosis Safe multi-sig wallet to manage the pod's funds. The pod name that takes you to the pod page (in this case post-architekts.pod.xyz), is also the pod's ENS name. This ENS name points to the Gnosis Safe multi-sig wallet address used by the pod. So one way of finding a pod's wallet address is to simply search for it on Etherscan.
Note: You will learn more about Gnosis Safe multi-sigs in the next modulate.
You remember that you only need the last four characters of the address. Go to Gateway and submit your answer.
Go to Gateway
Previous
Next
You enter the last modulate that needs backup on this archipelago chain. The musty smell is overwhelming. On the wall next to a large clock is a picture frame that says, Be Safe. Backup. Be Gnosis Safe.
Modulate 5
Atelier | Post-Architekts
Continue
Modulate 5
You enter the last modulate that needs backup on this archipelago chain. The musty smell is overwhelming. On the wall next to a large clock is a picture frame that says, Stay Safe. Stay Gnosis Safe. You look around to make sure no one is around. As you look at the picture you notice it’s a little crooked. As you go to straighten in you realize that there’s something behind the frame. You move the frame to reveal a safe. You turn the handle. Nothing happens. You look around the area near you for a note or a code.
Objectives
Understand the basics of Gnosis Safe.
Pick the correct answer below.
Action
In Modulate 4, you learned that every pod controls a Gnosis Safe multi-sig wallet. You also saw that the wallet address of the top-level Post-Architekts Pod is:
0x818784853aAF362328C482E466d3EdAcDCA6D08e
A Gnosis Safe multi-sig wallet is a smart contract wallet that requires multiple people to approve a transaction, before it can be executed on-chain. For example, if the safe has 5 joint-owners, you can set up the safe to require approval from up to 5 people. Requiring multiple approval signatures assures that a single person cannot run off with the funds. This is very useful for managing DAO funds, which is why Gnosis Safe has become a critical web3 primitive.
You can view the balance of a Gnosis Safe on Etherscan, but you can also view it in the Gnosis Safe UI. To view the Post-Architekts safe in the Gnosis Safe UI, go to this link.
Read the Getting Started guides to learn more.
Which of these blockchains is Gnosis Safe not currently deployed on?
Go to Gateway to submit your answer.
Go To Gateway
Previous
Next
Page load link