We are seeing more and more #nostr apps.

What is the trust model we are using for handling nsec?

I wish there was a section on nostrapps that indicates “Devs have reviewed the code, your nsec is safe.”

Reply to this note

Please Login to reply.

Discussion

If it doesn't use alby extension or amber I just don't use it.

On iOS things get complicated. Apps can’t talk to each other.

Nostore?

For websites it’s great, but it doesn’t work for apps.

Only use weeb appppsss?

Sure. But they are very buggy. I don’t think webpages managed memory correctly.

I’m not that tech savvy I would not know

lol, seriously? how do VPNs work then?

You give VPNs access to network settings.

so make an app that hase access to network settings and problem solved

i dunno nothin about these crapple things so just maybe a suggestion on how to work around this problem

Nah, doesn’t work that way.

idgaf how it works i bet you can find a work around

but probably won't fly with the app store bastards

Your suggestion is actually very smart.

There might actually be a way. Even if it on the phone itself.

For example, you can point a VPN to a local “Hardware Wallet” on the network that signs your events for you.

Then gives it back to the app.

i'm not a hacker but i can usually see obvious vulnerabilities in a protocol

i expect if you guys make an app that lets you do this that before the end of the year crapple will ban it but hey, i've seen this shitshow for the last 39 years or so over and over again be hostile to the user so yeah

but i hope i get a crack opened in the wall at least for a while

This is a good idea 💡An audit process for open source code. 🤔 I would like this for zap.cooking, just for assurance

Websites are much easier if they allow the use of nip-07. You don’t need to worry that much honestly.

But iOS apps it’s kinda risky, last year we went through the ZBD fiasco, who knows if many of us got compromised nsecs.

There are 3 types of login: a nsec, an extension and a seed phrase. We offer all three, but from a security perspective, I want to have confidence and I want users to have confidence that all are secure.

nostr:npub16v82nr4xt62nlydtj0mtxr49r6enc5r0sl2f7cq2zwdw7q92j5gs8meqha would like your perspective on how we can improve both security and confidence🤔

I haven't surveyed what's out there (beyond what I saw on nostr.cooking) but the first thing that comes to mind is the website issues a challenge (e.g. a 32-byte long random number) and the user has to post that to a relay. If they can do so, the website knows the user controls the keys and can authenticate that session.

This challenge would need to include the site you are logging into, otherwise I could pass along a challenge for nostr.cooking and tell the user this challenge is for my site (which it would be, but then I could tell nostr.cooking that I signed the thing so I should be authenticated).

With the FQDN in there, when I hand a challenge to a user that says the FQDN is nostr.cooking, they should know I'm trying to scam them and refuse to post.

The upshot is that the user only provides their npub, the URL for a relay they're going post to, and the post.

This is basically how FIDO2 works, so if you think this sounds like a good system, give them the credit. I just read the spec, wrote some little implementations of it, and can vouch that it seems solid.

What is the zbd fiasco?

ZBD is a gaming/social nostr app DO NOT put your current nsec in it.