yup

Reply to this note

Please Login to reply.

Discussion

i guess its slightly better? whatever

i don't think so, i haven't done a close inspection of the differences but i recall it has a HMAC which is redundant when you are signing, and its cipher mode is no better or worse than the one used in NIP-4

the only thing aside from HMAC that i see different between them is you put your signed message inside a message with the destination signed by a fresh key so the event only leaks the destination not the source

the golang implementation doesn't work and nobody has used it because i know, because it doesn't work, it fails to validate the HMAC, and it's a horrible, unreadable implementation

when i get the time i will be reimplementing it from the spec because the code from ezykis or whatever his name is is so bad i don't want to confuse my mind with it