Avatar
Teo Bull
32fb505683d2704e13819f5215737565539fdaf356f7bba0abc2899c65ad0052
Arbitrando soy Van Gogh Β· Arbitrage Β· Collector Β· Top #100 in Hyperliquid

GM! β˜•

Time to fly! 🫑

Hey! First time I've heard of your project!

Any significant differences compared to SimpleX? At the moment, I understand it's the top choice by far.

At first glance, it looks pretty good! I'm downloading it! πŸ™

Replying to Avatar mcshane

gm

That's life!! GM! 🫑

Today Friday, I'm getting ready to spend time with old friends and acquaintances for dinner, drinks, and a good time at the casino.

To those who live on the other side of the world, I wish you a good day! πŸ™

In a few days, we'll return to the UAE to resume our normal routine.

Being early is heavy.

I sell paintings for Bitcoin only.

Some people don't understand why.

Some think I'm limiting myself.

But here's what I've realized:

those who have understood the importance of Bitcoin are privileged β€” and often don't even realize it.

Not because they are smarter or destined to win, but because they noticed a crack in the wall before it became obvious to everyone. They sensed that money is not just currency, but trust; not just law, but power.

This is a quiet privilege: it offers no guarantees, promises no wealth, and spares no effort.

Understanding Bitcoin doesn't mean having arrived. It means having arrived early. And arriving early is uncomfortable: it makes you lonely, exposes you to doubt, forces you to explain things others are not yet willing to hear.

Many of those who "understand" don't feel privileged at all. They feel ahead of time β€” and being early is heavy.

Bitcoin is not a religion, nor a shortcut. It is a hard tool, demanding study, discipline, and responsibility. It does not forgive superficiality, technical or moral. It saves no one by magic.

The truth, without sugarcoating, is this:

understanding Bitcoin doesn't make you special. It makes you responsible.

Responsible for continuing to study.

Responsible for not mythologizing it.

Responsible for not preaching blindly.

Responsible for accepting that you might be wrong about timing, methods, outcomes.

If there is a real privilege, it lies only here:

Having suspected that the rules of the game were not eternal.

And that suspicion, once born, never lets you return to being at ease as before.

That's why for my paintings I only accept Bitcoin.

Not because I'm certain. But because I can't unsee what I've seen.

#bitcoin #art #nostr

100% agree πŸ™πŸ»

GM from beautiful Macau! 🫑

What you say is true, but my personal approach changes when the purpose of posting on Nostr isn't engagement. It's not about likes, building a community, or having followers. It's simply about uploading and preserving a record of my own comments and actions over time.

For me, it serves its purpose, whether there's interaction or not. πŸ™πŸ»

Today I received the XTEINK at my hotel in Macau, loaded up Neuromancer, and went down to the seaside to listen to the birds and enjoy reading.

Could there be a better plan?

I'm not in a DEX war, and competition is necessary, but.... Hourly funding on Hyperliquid: 0.0047!!! Yes, HOURLY!!

If you add up the fees, slippage, and funding, even though I'm in the Top #100 on HL, I'm moving all my trading to Lighter.

Both platforms are great for ease of use, and for my workflow, I don't notice any difference! well ... the difference is thousands of euros lost in commissions, and for trading crypto per-performers, I don't care if it's L1 or L19! 🫑

Overview

Decentralized authentication system built on Nostr protocol, eliminating traditional passwords. Provides secure authentication through cryptographic signatures and supports dual verification methods for complete user coverage.

Authentication Methods

1. With Browser Extension (Nostr Extension)

User accesses protected application

Automatic signing pop-up (via Alby, nos2x, etc.)

User signs the nonce challenge

Backend (N8N) verifies signature matches public key

JWT issued β†’ access granted

2. Without Extension (DM Authenticator)

User copies nonce text (pre-configured with secret)

Sends message as DM to Nostr authenticator

Backend detects DM in real-time

Verifies message came from correct private key

JWT issued β†’ access granted

3. WebAuthn Integration (Coming Soon)

Hardware security key support (YubiKey, etc.)

Biometric authentication (fingerprint, Face ID)

FIDO2 compliance for enterprise compatibility

Platform authenticator support (Windows Hello, Touch ID)

Privacy & Anonymity Architecture

Zero-Knowledge Authentication

The system is designed with privacy-first principles where the backend has minimal access to sensitive information:

What the Backend NEVER sees:

❌ Private keys (stay in browser extension/mobile app)

❌ Passwords (system is passwordless)

❌ User behavior patterns

❌ Application-specific data

❌ Personal identifiable information (PII)

❌ Email addresses or phone numbers

What the Backend ONLY verifies:

βœ… Cryptographic signature validity

βœ… Public key (npub) matches signature

βœ… Session expiration timestamps

βœ… Optional: npub whitelist membership

Privacy Benefits:

Client-Side Signing: All cryptographic operations happen locally (browser/mobile)

No Data Collection: Backend doesn't log user activity or analytics

Pseudonymous Identity: Only Nostr public keys used (no real names required)

Decentralized: No central authority controls authentication

Ephemeral Sessions: JWT tokens expire, no permanent user database

Protected Applications Isolated: Backend never proxies application data

What Protected Applications Receive:

JWT token with npub (public key only)

No access to signing capabilities

No private key exposure

Applications can optionally validate JWT independently

This architecture ensures that even if the backend is compromised, attackers gain access to no sensitive user data or credentials.

Technical Architecture

Components:

Nginx Proxy Manager: Reverse proxy + SSL termination

N8N Backend: Dual verification (JWT signature + active session)

Nostr Protocol: Decentralized authentication infrastructure

JWT Tokens: Stateless auth cookies (HttpOnly, Secure, SameSite=Lax)

Mobile Signer: Native app for mobile authentication (in development)

Security Flow:

User β†’ Request to protected application

Nginx checks JWT cookie (if exists)

Internal request to N8N /webhook/auth/verify

N8N validates: JWT signature + active session (defense-in-depth)

Valid β†’ Proxy to application | Invalid β†’ Redirect to login

Cookie Architecture:

Wildcard domains: Works on any domain (.yourdomain.com)

SSO capability: Single sign-on across all subdomains

JWT payload: 361 bytes, expires 1h (configurable)

Refresh tokens: Support for long-lived sessions

Self-Service Configuration Portal

Automated Setup Interface

The system includes a web-based configuration generator that streamlines deployment:

Client Setup:

Deployment Type Selection: Pre-configured templates for Nginx Proxy Manager, Apache, Caddy, etc.

Login Theme Customization: 6 admin-selectable themes (Dark, Light, Blue, Purple, Green, Orange)

Auto-Generated Client ID: Unique identifier per application

Backend URL Configuration: Points to your N8N instance

Server Configuration:

Auth Service URL: Your authentication frontend

Protected Path: Specific URLs requiring authentication

Session Duration: Configurable expiry (default 1 hour)

Authorization Rules:

npub Whitelist: Optional restriction to specific Nostr public keys

Empty = anyone can authenticate

Filled = only listed npubs allowed

One-Click Config Generation:

System generates complete Nginx configuration based on your selections

Copy-paste ready for immediate deployment

All security headers and optimizations included

No manual editing required

Mobile Application (In Development)

Nostr Signer Mobile App

Native mobile authenticator for on-the-go authentication:

Features:

QR Code Scanning: Quick authentication via QR code

Push Notifications: Real-time authentication requests

Biometric Security: Fingerprint/Face ID to approve signatures

Multi-Account Support: Manage multiple Nostr identities

Offline Signing: Sign authentication requests without internet

Use Cases:

Desktop authentication via mobile device

Secure signing without exposing private keys to browser

Enterprise environments requiring hardware-backed keys

Air-gapped security for high-value accounts

Target Audience & Use Cases

Who Should Use This System?

1. Privacy-Conscious Organizations

Companies that value user privacy and GDPR compliance

Organizations wanting to eliminate password breach risks

Businesses reducing PII collection liability

Services targeting privacy-aware demographics

2. Self-Hosters & Homelab Enthusiasts

Individuals protecting personal services (NAS, media servers, dashboards)

Multi-service deployments needing unified authentication

Users wanting control over their authentication infrastructure

Eliminating password fatigue across dozens of self-hosted apps

3. Nostr Ecosystem Projects

Nostr relays requiring authenticated access

Nostr-native applications and services

Communities building on decentralized infrastructure

Projects leveraging existing Nostr identities

4. Small-to-Medium Businesses (SMBs)

Companies without IT security teams for password management

Businesses reducing operational costs (no password reset helpdesk)

Teams needing quick deployment without complex infrastructure

Organizations protecting customer-facing portals

5. Developers & SaaS Providers

Multi-tenant applications with domain-per-customer architecture

API gateways requiring authentication

Development/staging environments protection

Internal tools and admin panels

Why Choose Nostr Auth Over Alternatives?

vs. Traditional Username/Password:

βœ… Zero password breach risk (no passwords to steal)

βœ… No password reset workflows (saves support time/costs)

βœ… No password storage liability (GDPR/compliance)

βœ… Eliminates weak password problems

vs. OAuth2 (Google/Facebook Login):

βœ… No vendor lock-in (independent identity)

βœ… No user tracking by third parties

βœ… Works without internet dependency on IdP

βœ… Full control over authentication flow

βœ… No data sharing agreements required

vs. Enterprise SSO (Okta/Auth0):

βœ… Zero monthly subscription costs

βœ… No per-user pricing models

βœ… Simpler infrastructure (no central auth server)

βœ… Open-source and auditable

βœ… Deploy in minutes vs. weeks

vs. Self-Hosted Keycloak/Authentik:

βœ… Lower resource requirements (no database)

βœ… Simpler maintenance (fewer components)

βœ… Faster deployment (copy-paste config)

βœ… Better privacy (no user database)

βœ… Inherently decentralized

Ideal Deployment Scenarios:

Scenario 1: Multi-Service Homelab

Problem: User runs 20 self-hosted services, each with different login

Solution: Single Nostr identity authenticates across all services via wildcard cookie domain

Scenario 2: SaaS with Custom Domains

Problem: Each customer gets customer.saas.com subdomain, needs isolated auth

Solution: Self-service portal generates configs, customer deploys in minutes

Scenario 3: Privacy-First Startup

Problem: Want authentication without collecting emails/passwords (GDPR nightmare)

Solution: Users authenticate with existing Nostr identity, zero PII collected

Scenario 4: Development Team Internal Tools

Problem: 10+ internal dashboards need protection, don't want another auth system

Solution: Team members use Nostr keys, unified access across all tools

Scenario 5: Community Platform

Problem: Want only verified community members accessing resources

Solution: npub whitelist restricts access to approved members only

When NOT to Use This System:

❌ Mainstream Consumer Apps - Users without Nostr familiarity (requires education)

❌ Regulated Financial Services - May require traditional audit trails (coming with WebAuthn)

❌ Legacy System Integration - If you need LDAP/SAML compatibility

❌ Non-Technical User Base - If users struggle with browser extensions

However, the DM authentication method and upcoming WebAuthn support significantly expand accessibility beyond technical users.

Key Features

βœ… Passwordless: Zero passwords to remember or manage

βœ… Privacy-First: Backend never sees private keys or PII

βœ… Dual Authentication: Support both with/without browser extension

βœ… Multi-Domain Ready: Works on any domain - just configure variables

βœ… Self-Service Setup: Web portal generates config automatically

βœ… Defense-in-Depth: Dual verification (JWT + N8N session)

βœ… Production Hardened: Security headers, optimized timeouts, IPv6 disabled

βœ… Fast Performance: ~40ms response time

βœ… Decentralized: No dependency on centralized IdP

βœ… Zero Data Collection: No analytics, tracking, or PII storage

βœ… Mobile Ready: Native app for smartphone authentication

βœ… WebAuthn Support: Hardware keys & biometrics (coming soon)

Production Status

Tested: Multiple production deployments

Performance: 40ms total response time

Security: OWASP headers, HttpOnly cookies, SameSite=Lax

Reliability: Dual verification (JWT + session check)

Scalability: Template ready for instant deployment

Privacy: Zero-knowledge backend architecture

Rapid Deployment

Via Web Portal (Recommended):

Access configuration portal

Select deployment type (Nginx Proxy Manager)

Choose login theme

Configure server URLs

Set session duration

Add npub whitelist (optional)

Copy generated config β†’ paste in Proxy Host β†’ Advanced tab

Test authentication

Deployment time: < 3 minutes per domain

Manual Configuration:

Copy template config

Edit 6 variables: $client_id, $redirect_uri, $n8n_callback, $cookie_domain, $auth_service, $n8n_verify

Change proxy_pass to application port

nginx -t && nginx -s reload

Test authentication

Advantages vs. Traditional Solutions

vs. OAuth2 Proxy:

βœ… Multi-domain native (no multiple containers)

βœ… Dual authentication method (extension + DM)

βœ… Decentralized (no central IdP dependency)

βœ… Self-service configuration portal

βœ… Better privacy (no user tracking)

vs. Keycloak/Auth0:

βœ… Zero infrastructure overhead

βœ… No user database required

βœ… Privacy by design

βœ… Lower operational costs

βœ… Simpler deployment

vs. Traditional Passwords:

βœ… Zero phishing risk

βœ… Zero password breaches

βœ… Superior UX (click-to-sign)

βœ… No password reset flows

βœ… No password storage liability

Roadmap

Current (Production Ready):

βœ… Browser extension authentication

βœ… DM authenticator fallback

βœ… Self-service configuration portal

βœ… Multi-domain support

βœ… JWT + session dual verification

βœ… Zero-knowledge backend architecture

In Development:

🚧 Mobile signer application

🚧 QR code authentication

🚧 Push notification support

Planned:

πŸ“‹ WebAuthn integration (FIDO2/U2F)

πŸ“‹ Hardware security key support

πŸ“‹ Biometric authentication

πŸ“‹ Rate limiting & DDoS protection

πŸ“‹ Admin dashboard for session management

πŸ“‹ Audit logging (optional, privacy-preserving)

Conclusion: Production-ready, scalable system with dual authentication methods ensuring 100% user coverage. Self-service configuration portal enables rapid deployment across unlimited domains. Privacy-first architecture ensures backend never accesses sensitive user data. Ideal for privacy-conscious organizations, self-hosters, Nostr ecosystem, SMBs, and developers seeking secure, passwordless authentication without vendor lock-in or PII collection liability.

open source?

GM 🫑... and Happy new year!

It seemed like an interesting news story, although honestly I stopped reading in the second paragraph when it says, "The Chinese government has signed off on the deal, which involves..." The signatory was Bytedance, not the government, so I think the whole story is playing the biased game, and I'm really tired of these games.

I've lived in Macau for over 16 years now, and some news stories border on the absurd.

Anyway, good morning! 🌞