Skip to main content

Convex Desktop

Convex Desktop is a GUI tool for interacting with Convex. Designed for developers and power users, it puts all the capabilities of Convex at your fingertips.

Convex Desktop Screenshot

Installation

Convex Desktop requires:

  • A recent version of Java (21+, Java 22 recommended)
  • A GUI based operating system (e.g. Windows, Linux or MacOS)
  • A copy of the convex.jar executable jar file

Java is available from multiple providers, we recommend:

Snapshots of the convex.jar file are currently available here: Convex Snapshots

Running Convex Desktop

If Java is correctly configured, you should be able to run Convex Desktop simply by double-clicking on the convex.jar file which will run Convex Desktop as an executable. On some systems, you may need to grant permissions to run a downloaded executable file.

Alternatively to run Convex Desktop, you can run the following commend from the command prompt, script or GUI shortcut:

java -jar convex.jar desktop

Hello

Foo

DeskTop

Source code for Docusaurus on Desktop

Introduction for non-crypto Developers

What is Convex?

  • A platform for building decentralised applications (dApps)
  • Provides sub-second performance at 10k+ transactions per second (TPS) on a public or private network
  • Immutable data stores, securely encrypted

Convex Desktop

  • Create Convex accounts and Peers via a graphical user interface (GUI) for operating networks
  • Allows developers to generate test networks and secure crypto keys prior to production use
  • Prepare and test transactions before committing to execution or paying fees
  • Manage a wallet for storing keys and account balances
  • In production, earn fees for staking and operating Peers
  • Use for global scale payments and gaming

Getting Started

  • Compatible with Windows, Linux, and MacOS
  • Requires Java 21 or higher
  • Download the latest convex.jar from Convex Snapshots
  • Learn Convex Lisp for more advanced functions
image

Step 1a: Hacker Tools KeyGen

image
  • Click Generate – 12 words appear in seed Phrase
  • Enter Passphrase (lower case)
  • Record both someway safe. DON’T LOSE
  • Ignore Key Derivation
  • Copy Private Ed25519 seed somewhere safe. DON’T LOSE. DON’T SHARE. This is also known as Private Key
  • Copy Ed25519 Public Key. Can be shared
  • Remember identicon. It will be useful later
  • Normalise mnemonic sets lower case
  • Click Add to keyring

Step 1b: Hacker Tools Load Keystore

image
  • Icon for swift recognition
  • Public key to share
  • Source = location of keystore
  • Lock for extra security, keep separate from other keys and passphrases.