I have no idea. I've never developed an OS before.

Reply to this note

Please Login to reply.

Discussion

there's no need to, you are just creating a system-wide auth scheme based on bip-340 keys, literally just means a native signer enclave/bunker and a nostr based remote shell interface

also, yes, it would be easy to build this tooling and have a simple lock/unlock interface and permissions for event signing and everything, think like nos2x but it's SSH as well, so you can also use it to connect to your VPS or router and you could even then build further to create client services and ACL permissions systems that are generalised and cover everything, not just read/write access to relays, i mean everything, including blossom servers, CDN download, everything

it makes small scale peer to peer services spamproof and dos proof

Yeah, just do that.

Me neither. I'm not a techie, I just understand some design principles :)

Same. 😂

I'm just like, why do I have to keep signing into things? This is annoying. Everything is on the same computer. Can't you just ask the computer?

He knows, he was there.