Yes

Reply to this note

Please Login to reply.

Discussion

Interesting… how do you envision it actually working with the protocol?

Who holds the keys for the non nostr user?

I have no idea. I’m not technical enough

Haha.

Maybe - generate unique email that you’ve signed and published to a bridge.

Any emails that get sent to that signed bridge, get encrypted with a unique one time key and pushed to the user who signed the bridge relay email.

To allow someone to email you, sign their from address, at the bridge.