i should probably add that in addition to this, i have designed an access control system that depends on follow lists, you designate "owner" accounts that designate follows, and these followed accounts, and follows of those follows are all whitelisted to read and write to the relay
this scheme also is facilitated by actively spidering other relays for that list of events especially the relay and follow lists, the profile metadata is superficial but helpful for providing clients with display names and avatars