I'd be curious to know as well because I thought delegation keys were pretty fucking mind-blowing when I figured out what they did.
What was wrong with nip-26 and how was it flawed on technical and security levels?
https://github.com/nostr-protocol/nips/blob/master/26.md
πΆπΎπ€π€π€π€π€π€π€π€
I'd be curious to know as well because I thought delegation keys were pretty fucking mind-blowing when I figured out what they did.
Exactly! And I havenβt seen any evidence of it being broken in any way πΆπΎπ«‘