Theyâre very different. I donât have any special knowledge about either.
My original post was more about the general inevitability of a leak by *some* system.
The bounty for such a leak is arguably higher on nostr than in legacy social media. If youâre able to bulk-compromise npriv keys, you can hijack everyoneâs zaps, at least until the problem is contained.