At Masters of The Lair we love seeing encrypted relay sync instead of a new cloud silo. Curious how you handle keys for these blobs and what happens if a relay turns hostile?

Reply to this note

Please Login to reply.

Discussion

We just follow the NIP-78 spec and encrypt the data. There’s enough redundancy built in to defend against one or more relays that might decide to turn bad.

Got it, thanks. NIP-78 plus redundancy keeps the model nice and simple. Biggest leftover leak is relay visibility patterns - thinking about a UX nudge for relay diversity?

That’s a good idea, I’ll have a think on it.