this. nostr is just bad for private stuff. nostr DMs were a mistake. We can do better and leverage protocols more suited to private comms to protect peoples privacy at a level that would piss off the NSA. nostr:note1mvx4a2g6dw4kanemrech059vu6hx4d3jtghcu746l7934jk9j85skqtmkh

Reply to this note

Please Login to reply.

Discussion

Agreed, DMs feel more like meta data for the protocol than protected messages

Can we just like advertise a signal link on our profiles or something? Idk how that works lol

SimpleX recommends sharing the connection string out of band, so nostr would be good for that

💯

DM ≠ PM

DMs are fine as is but still should have a true PM option with clear expectation between the two options

great

pull DMs from Damus?

agree

I love your style! That would be amazing but I just think our government will never go for it unless there was a law set for them. It’s a nice dream for sure.

Perhaps integrate with wire.com ?

Yeah, Simplex is cool. Another alternative is Session app.

I currently agree strongly.

My2sats: NOSTR for some kind of public key distribution with built in social verification and then transition over to holepunch (used by keet) to do direct p2p messaging.

The NSA is laughing... They can get everything quite easily..

So true. Nostr is currently entirely public.

It would be able to delete DM.

LFG

Just integrate and add SMP & XFTP protocols.

Can I ask how Nostr DM’s arent private? I thought they are encrypted messages between two parties?

The content is.

But DMs leak..

- who is sending messages to who

- about what time (and more certainty when DMs back and forth in succession)

- size of message

Ok thanks for clarifying

Where does this info leak?

When an event is posted to relays. Anyone that operates the relay or can read from the relay can receive those events and make determinations noted, even though they can't decrypt the contents.

Think of the DM as the letter inside an envelope that is addressed to received, has a sender, postage stamp is marked. Anyone can see the envelope but can't see the message.

Cool. Thanks for clarifying once more. So for full privacy, the parties would just have to run and connect to their own private node?

I mean relay

If they could connect direct to each other bypassing nostr or public relays sure.

There's some other strategies to consider

- participants (A, B) could make new ephemeral keys (Ae, Be) for communicating and exchange that information in a normal direct DM. This still shows correlation between those new key sets, but can obscure who is talking to who if there's enough traffic otherwise.

- an initiator (A) could send a DM to an intermediate recipient (I) to facilitate passing ephemeral pubkey (Ae) in nested encrypted messages the intermediary itself can't read. The intermediary is effectively a remailer, forwarding the nested encrypted message from A to B, and B then creates a new key (Be) to initiate message back to (Ae) The intermediary represents a central weakpoint though and if compromised would reveal to the compromiser that A is talking to B, but it's better than it being directly obvious

- taking the above this could be chained through multiple remailer intermediaries. That's similar to what things like Tor and SimpleX do, just slower, and the initiator is setting up the path from the beginning.

We need to learn from past approaches to remailera in the physical and digital world, and wrapping encrypted messages.

Nostr for public stuff and nostr:npub1exv22uulqnmlluszc4yk92jhs2e5ajcs6mu3t00a6avzjcalj9csm7d828 for private stuff. That simple…

Check Elastos and its Carrier 2, which is P2P protocol. Suited well for private coms.

https://elastos.info

Have you seen Arcade? (:

nope

Even without full privacy, Nostr DMs are still very useful for messaging with entities where you don't want to spam your followers with junk as most clients filter them out from view or don't retrieve DMs that can't be read by the recipient in the first place.

nostr:nevent1qqsdzu99v97wn3gy4rzf8valxs82vnmx8ymhzzzdrgpyn9wat3ew98spzpmhxue69uhkummnw3ezumt0d5hsygpjuxp8vd29p6ancknaztql3eajk52y8xkppfn7au7elkw9c68zg5psgqqqqqqs675t3k

+1

a friend told me to just use the Sessions app but i’m definitely curious about SimpleX as Jack knows a thing or two about privacy and technology. will try both and would love to hear any opinions if someone’s tried both

I had both, but I recently uninstalled simplex because the last version drained my phone battery. Maybe I'll reinstall it latter

thnx, yeah simplex is prenew so i’m sure they’ll optimize it to use less juice soon. will download both and do some testing as well

Agreed

So what is the best practice to securely point someone to a signal phone number?

Place a text file or an image to a proton drive with a pasword on it. Send the link to the file and the password in the nostr dm. Erase when download is confirmed by the other side?

There may be more ellegant solutions with other messengers (one time links with an expiration) perhaps.

Could there be a "cache" in the nostr client (that you could link to in a dm), that would be accessible via a p2p connection for one time to exchange a secret? Is this how a security nightmare looks like? 😎🙈

XMPP