point two!
yes, that's partly why i wrote a basic access-based garbage collection algorithm for relays so they can run on some fixed sized disk space limit and maintain that, while opportunistically retaining indexes before they take up the free space of the high water mark that triggers throwing out least recently accessed
- and yeah, keys... the concept of controlling your sovereign key secret is gonna take some serious marketing to get people to learn it
it's not hard, the whole crypto scene gets it but we need the normies too, so how do we induct them without financial incentives
ahhh, you see, that's the reason why people learned to use elliptic curve crypto keys in the first place
so there is a common interest between the security model of nostr and the necessity of associating the protocol with secret keys and payments