https://github.com/nostr-protocol/nips/blob/master/46.md
> The client always starts by generating a random key which is used to communicate with the signer
セッションごと?
https://github.com/nostr-protocol/nips/blob/master/46.md
> The client always starts by generating a random key which is used to communicate with the signer
セッションごと?
https://github.com/nostr-protocol/nips/pull/831#issuecomment-1821474706
> but it may be better to use a random key for the session or a persistent signer-key.
永続的な pubkey でも良さげ。まあ、そうですよね
> ```
>
> ```
`optional-secret` は OTP (ワンタイム パスワード)
参考: https://ndk.fyi/docs/classes/NDKNip46Signer.html#constructor
> The signer scans the QR code and sends a connect message to the client in the specified relays.
NIP を素直に解釈すると、`"ack"` を送信すれば良さそう
> And the events the remote signer sends to the client have the following format:
>
> ```js
> "pubkey": "
> "kind": 24133,
> "tags": [
> ["p", "
> ],
> "content": "nip04_encrypted_json({id:
> ...
> ```
> The user copies that token and pastes it in the client UI somehow. Then the client can send events of kind `24133` to the specified relays and wait for responses from the remote signer.
https://github.com/nostr-protocol/nips/pull/831#discussion_r1372968659
会話の流れから察すると、`connect` を送信する必要はなさそう
> The signer key will always be the key of the user who controls the signer device.
これは何でも良さそう
> - **connect**
> - params: [`pubkey`, `secret`]
なるほど、わからん
https://github.com/nostr-protocol/nips/pull/831#discussion_r1401571254
なんとなく理解できた気がする
> bunker://
`hex-pubkey` は `signer-key-hex`?
> - params: [`pubkey`, `secret`]
`client-key-hex`?