> Signing and encrypting are different operations

Perhaps in the diagram you could include the premise that the user is operating in the two clients with a signer that cannot encrypt (FROST bunker); this would make it easier to understand why such a structure becomes necessary.

Even if there are probably other uses cases, like

nostr:nevent1qqsx880slhhsg0u53te2u8mkgq28y7dke9z2u2mxa5w629fx9pv893qpzdmhxue69uhhwmm59e6hg7r09ehkuef0sr475x

Reply to this note

Please Login to reply.

Discussion

This image was just thrown out of context for no reason, I didn't expect it to be shared so much.

Anyone interested should read the NIP proposal I linked above (too late).