Bitcoin Bounty Challenge Update

HRF has determined that Iris secret chats by nostr:npub1g53mukxnjkcmr94fhryzkqutdz2ukq4ks0gvy5af25rgmwsl4ngq43drvk partially

qualifies for bounty #3 (e2e encrypted nostr group chats) and will

receive 1 BTC of the reward ๐Ÿ‘

The remaining 1 BTC is open to any popular nostr client that can

create e2e encrypted nostr group chats with an interoperable standard

via a merged NIP

Martti's submission with Iris did not qualify for the full bounty as

only Iris users can initiate a group chat

We are excited by all of the interest from around the world in this

bounty program and expect to make more announcements about claimed

bounties soon ๐Ÿ˜‰

https://hrfbounties.org/

Reply to this note

Please Login to reply.

Discussion

I am worried about how you are operating this bounty. E2e encryption is not an easy thing to get right (in the context of leaking metadata), the implementation is in open discussion, there are always tradeoffs and so getting people to rush to be first instead of working to get it right is worrying.

If you just wanted e2e encryption, pay nostr:npub1a8jzweysxa9qmtmht874736aalm0lwdsl306nrys9d05ktlrhw3qcr5pj4 for his original nip.

You and Ben are very welcome to apply

This feels really rushed. nostr:npub1g53mukxnjkcmr94fhryzkqutdz2ukq4ks0gvy5af25rgmwsl4ngq43drvk should be considered a potential solution, but it's not even a NIP yet (unless I am missing something).

๐Ÿค

Bounties are a tricky thing. In the end we felt like they could be helpful in moving some features forward and that would be net a good thing. Martti has made some progress and has been rewarded with a partial bounty which reflects HRFโ€™s judgement that it is a partial solution

It's ok. But I strongly recommend switching from whoever can provide the fastest claim to periodic reviews. The bounty program is up for 1 yr. You can do a review of all claims by December and another on by June, 2024. This will give you time to evaluate. Then, pick whoever got closer to the spirit of the bounty and the needs of HRF.

Wow! Congrats

though I do agree any adopted standard needs at a minimum forward & future secrecy and should not re-use keys. Very easy to roll something dangerous out here by rushing ๐Ÿ˜ฌ

Congrats to #[0] ! It seems the others replying to this thread might use their time better by actually developing a solution to win the remaining bounty instead of griping over someone elseโ€™s accomplishment.