HTTP auth (NIP 98) … is an interesting approach. So a user (somehow) authenticates their nsec with a web client (still haven’t fixed this part) and this client then lays an auth cookie in the user’s browser which can be validated by other clients? And what about when these other clients request “additional” permissions not covered by the cookie? Seems tricky to handle Nostr auth without actual live access (somehow) to the nsec for signing…?
nostr:nprofile1qqsrs7xetkmms4xr5rfm944hh7dl9zekzc47vsex74fphfcu7w6956gpr9mhxue69uhks6tkv46xzmrt9ehx7um5wgcjucm0d5q3jamnwvaz7tmswfjk66t4d5h8qunfd4skctnwv46z7qg5waehxw309aex2mrp0yhxgctdw4eju6t00n89td and I have discussed this and thought the NIP-98 could be used for that.
Discussion
See reply to derek above