Convex Desktop
Convex Desktop is a GUI tool for interacting with Convex. Designed for developers and power users, it puts all the capabilities of Convex at your fingertips.
Installation
Convex Desktop requires:
- A recent version of Java (21+, Java 22 recommended)
- A GUI based operating system (e.g. Windows, Linux or MacOS)
- A copy of the
convex.jar
executable jar file
Java is available from multiple providers, we recommend:
Snapshots of the convex.jar
file are currently available here: Convex Snapshots
Running Convex Desktop
If Java is correctly configured, you should be able to run Convex Desktop simply by double-clicking on the convex.jar
file which will run Convex Desktop as an executable. On some systems, you may need to grant permissions to run a downloaded executable file.
Alternatively to run Convex Desktop, you can run the following commend from the command prompt, script or GUI shortcut:
java -jar convex.jar desktop
Hello
Foo
DeskTop
Source code for Docusaurus on Desktop
Introduction for non-crypto Developers
What is Convex?
- A platform for building decentralised applications (dApps)
- Provides sub-second performance at 10k+ transactions per second (TPS) on a public or private network
- Immutable data stores, securely encrypted
Convex Desktop
- Create Convex accounts and Peers via a graphical user interface (GUI) for operating networks
- Allows developers to generate test networks and secure crypto keys prior to production use
- Prepare and test transactions before committing to execution or paying fees
- Manage a wallet for storing keys and account balances
- In production, earn fees for staking and operating Peers
- Use for global scale payments and gaming
Getting Started
- Compatible with Windows, Linux, and MacOS
- Requires Java 21 or higher
- Download the latest convex.jar from Convex Snapshots
- Learn Convex Lisp for more advanced functions
Step 1a: Hacker Tools KeyGen
- Click Generate – 12 words appear in seed Phrase
- Enter Passphrase (lower case)
- Record both someway safe. DON’T LOSE
- Ignore Key Derivation
- Copy Private Ed25519 seed somewhere safe. DON’T LOSE. DON’T SHARE. This is also known as Private Key
- Copy Ed25519 Public Key. Can be shared
- Remember identicon. It will be useful later
- Normalise mnemonic sets lower case
- Click Add to keyring
Step 1b: Hacker Tools Load Keystore
- Icon for swift recognition
- Public key to share
- Source = location of keystore
- Lock for extra security, keep separate from other keys and passphrases.