From my viewpoint, the relay doesn't need to implement signing or undergo any changes. To put it into perspective with my current situation, user's browser is storing private node data, say, a CLN rune. Whenever a user switches a browser or clears the local storage, they're required to re-enter the data.

The workaround I've considered involves my app generating a "vault-store" event. The user's extension would then encrypt it, sign it, and broadcast it to the relays.

Following this, when the user logs back in via nostr, my app could request the extension to decrypt the value and re-store it in the browser's local storage.

What do you think?

Reply to this note

Please Login to reply.

Discussion

Additionally, this approach simplifies sharing user's private data across various apps, while maintaining ongoing user consent.

So more like a self DM?

Definitely, that was my first idea. But I'm pondering if there's a method that fits this scenario better. Instead of providing an app access to all decrypted dms, how about granting access only to particular necessary (unencrypted) keys? It'd also be a more precise and secure way to share private data across apps.

just do a passphrase on the key; I'll do that on Highlighter too at some point

nostr:npub1ek88duljevwf8mqquvjtarjlwjpzn8zjllymgtvdd4eyjqne0r0qxetvsn

try this out on highlighter.com/my

it already does exactly that

https://pablof7z.com/images/2023-05-31.mov

I think my current browser doesn’t like Highlight. Will change browser and see

what browser?

Orion