Amethyst has been sending images to relays for 4 months now :)
We will fix the web.
We need a massive bounty for somebody to fork a browser.
This website is hosted by Nostr relays: https://nostr-webserver-3c29f7957ffe.herokuapp.com/e/1efc13c6ffbaf60c0347baf89f6ecaad22f74abf82165fcdb55ef7e8cca8a597
The HTML (kind 5392), JavaScript (kind 5394), CSS (kind 5393), and Images (Kind 1965/1964) are all hosted inside several relays and can be moved to any other relay if needed by simple broadcasting.
One day browsers will fetch nostr:
Code is here: https://github.com/vitorpamplona/nostr-web-server
I can picture nostr:npub1v0lxxxxutpvrelsksy8cdhgfux9l6a42hsj2qzquu2zk7vc9qnkszrqj49 shipping Snort directly to relays. There is no domain anymore. You just hit the Nostr address and the last version of Snort loads up.
Yep, an @.Note loads Snort inside your feed.
Yep, but that is just exposing events from nostr relays. It's not the website itself. It's just a way to go around the fact that browsers don't resolve nostr:
Performance. Ipfs' wayfinding sucks.
We have to get going in there.
I am still amazed by the actual code:
Look at the CSS + JS imports! :)
This website is hosted by Nostr relays: https://nostr-webserver-3c29f7957ffe.herokuapp.com/e/1efc13c6ffbaf60c0347baf89f6ecaad22f74abf82165fcdb55ef7e8cca8a597
The HTML (kind 5392), JavaScript (kind 5394), CSS (kind 5393), and Images (Kind 1965/1964) are all hosted inside several relays and can be moved to any other relay if needed by simple broadcasting.
One day browsers will fetch nostr:
Code is here: https://github.com/vitorpamplona/nostr-web-server
R allows apps to follow urls. So, when users post with a url, it can be searched by it.
The question is about prefixes. If I am interested in amethyst.social, i can follow it. But I want to follow all possible amethyst.social/* addresses.
Same for Geohashes
What's the likelihood of relays implementing `g` (Geohash) and `r` (URLs) tag filters as prefixes?
Hey nostr:npub1gd3h5vg6zhcuy5a46crh32m4gjkx8xugu95wwgj2jqx55sfgxxpst7cn8c would you know anything about this?
For reference, the app uses this class: https://developer.android.com/reference/android/location/Geocoder
Trending sucks.
It's supposed to be in-device. So, a firewall or ad block wouldn't interfere with it. Maybe they don't have the local database to reverse locations...
Hum... I wonder if they remove the reverse geolocation API 🤔

