Yes
Discussion
Interesting… how do you envision it actually working with the protocol?
Who holds the keys for the non nostr user?
I have no idea. I’m not technical enough
Haha.
Maybe - generate unique email that you’ve signed and published to a bridge.
Any emails that get sent to that signed bridge, get encrypted with a unique one time key and pushed to the user who signed the bridge relay email.
To allow someone to email you, sign their from address, at the bridge.