At nostr:npub1pu3vqm4vzqpxsnhuc684dp2qaq6z69sf65yte4p39spcucv5lzmqswtfch we did some similar work on top of your library for a probably incomplete version of Nip-17 but it may be useful anyways https://github.com/planetary-social/nos/blob/aebbcb7353ec5cc34584bc3c802ddb6b754cb6ad/Nos/Service/GiftWrapper.swift
nostr:npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z nostr:npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn I’m having trouble wrapping (no pun intended) my head around the one-time use random keypair used to sign the kind 1059 gift wrap event. If I want to see the NIP-17 DMs that I’ve sent from my client, would I have to keep track of the random keypairs that I’ve used so that I can decrypt the gift wrap content and render them in the future? Alternatively, would I just need to store the seal events locally on my client?
Context: I’m adding NIP-17 DM support to Nostr SDK for Apple Platforms and the randomized keypair stuff on the gift wrap confused me.
Discussion
No replies yet.