Another cool feature of this system is that you don't need to trust the counter party or the group you are talking with. They cannot expose your messages without significantly exposing themselves (leaking their main account's private key).

In many other proposals, all an unsatisfied person has to do is to expose the conversation's shared secret and boom, everyone can see and verify your messages. And they can leak that secret anonymously, without any damage to themselves.

nostr:nevent1qqsyqedg30uz6lgulu36yxsfgfsh8wv69s7sth9dujdx0jevhchm4rcppemhxue69uhkummn9ekx7mp0qgsyvrp9u6p0mfur9dfdru3d853tx9mdjuhkphxuxgfwmryja7zsvhqrqsqqqqqp5epgm9

Reply to this note

Please Login to reply.

Discussion

👀

Awesome!

But it's still clear that the receiver got a message, just not who the sender is, right?

How does the disappearing messages work?

Disappearing is for your outgoing messages only. Just don't send the Gift wrap to yourself and you won't be able to recover your messages.

Thanks.

This scheme does NOT have forwarded Secrecy of the receiver, right?

I guess there is forward Secrecy for the sender due to the ephemeral key of the gift wrap. But the receiver has only a single long term static key.

And as soon as your backup scheme is used, there is no forward secrecy anymore anyhow.

Is that true? I was hoping the link between the keys remained offline. The secrecy would only break if the attacker got the main key and the backup key.

Ah, so the main key does a gift wrap to send the backup to a new pubkey, thats why the relationship between these two keys is private?

And thus even if the main key leaks, the backup keys are not known.

And if you need to access the backups just giftwrap them with yet another key so that they backup key never leaves the backup client.

Ok, thanks.

So, is it correct that the sender has forward secrecy, the receiver does not?

I think so. Maybe the better way is that we haven't been able to figure out a way to do it yet.

Yep, the main key doesn't have any gift wrap to recover from.

Correct. The use of the main key as receiver makes it country party trustless. If the receive uses a separate key to receive, he just needs to leak that key to expose the sender.

* Counter party.

I see, that's a fascinating incentive design.

It's clear the receiver got something encrypted. It might not be a message (it could be a private zap) and it might not be from the day.

It could NOT be a private list by the "receiver", correct?

There might be a way to do it, but every time I assemble an alternative to the pubkey, it breaks some of the privacy guarantees or the need to trust the counter party :(