We just follow the NIP-78 spec and encrypt the data. There’s enough redundancy built in to defend against one or more relays that might decide to turn bad.
We just follow the NIP-78 spec and encrypt the data. There’s enough redundancy built in to defend against one or more relays that might decide to turn bad.