there is nothing less secure about NIP-04 than NIP-44

they both use AES cipher modes, both use GCM, unless i am forgetting, and the only material difference as a cryptosystem between them is a diffferent HMAC and the use of a second layer that hides the origin from the relay

if you ask me, it's not actually doing anything useful, complicates things, and doesn't help anyone, and has just impeded the progress of DMs, application specific data and ephemeral message encryption by making two where there was one

really, cryptographically they are equivalent, the NIP-44 was only made to try and reduce metadata leakage, and that's irrelevant for ephemeral events

irrelevant

Reply to this note

Please Login to reply.

Discussion

"hiding the origin from the relay" is useless, i don't even know why anyone thought that was helpful

hint: they know your IP address, or they can, and they can log that alongside your destination npub so it achieves nothing

IP address mixer? please

then you have a spam problem

t-y mleku/still shallow end

the reason is to hide IP you have to use layers of encryption and the relays that pass it on are then open to abuse from anyone to DoS them

not many people have been deep in the subject and i've been following Tor since 2006, just search "David Vennik" and you'll see, i was on the mailing list right at the beginning, this is part of my path to #bitcoin

nip04 uses AES CBC. nip44 uses xchacha20, which is a technically a counter mode cypher not CBC I believe. Nonces are used for encryption and MAC.

The other big thing is versioning and a binary concatenation spec which I think adds some really good future proofing.

https://github.com/nostr-protocol/nips/blob/master/44.md#encryption