Avatar
Ostrich McAwesome
703533c2c16ac7771efb1bdf60a85df74e42f8409a007900f402ba4684f99184
*deep hoots and guttural grunts* BTC: bc1qeh6dmzz9gr7uwd7jzhnx7mclchlmkwucjzuxjv

If any relay admins see some strange events today, sorry about that, I'm trying something.

NIP-26 is extremely smart. It should be a requirement for signing into any client.

Hot keys for your Nostr clients, cold key just for signing delegation events.

This is critical though: https://github.com/nostr-protocol/nips/issues/654

Sounds like an image proxy. Whatever client you use didn't forget it when implementing NIP-30.

🧙‍♂️🔮 I can see your IP Address 🪄

:a: :b: :c: 🔳 :d: :e: :f: 🔳 :g: :h: :i: 🔳 :j: :k: :l:

This is entirely hypothetical, but if somebody managed to leak a large number of nsecs, the funniest possible thing to do with them would be to shuffle them and then DM them back to everyone affected and watch who takes liberties with the key they received. Then post a list of who got who's key and let the drama unfold.

The real issue is inconsistency. Different clients have different ways of trying to protect you from the same features, all of which are implemented differently.

Also, using an image proxy may protect you from leaking your IP, but as I have mentioned previously, this would now mean that URLs from your end-to-end encrypted messages would be decrypted and sent to the proxy, damaging your privacy in a different way.

Ultimately, my take on Nostr web clients is that if you're using any other browser than Tor Browser, you're doing it wrong.

One fundamental flaw I see with this idea is that if you are addressing the method in which I gathered these IPs (via DM), you would have to send decrypted URLs from a users end-to-end encrypted DMs to the image proxy, which endangers privacy in a new way because it revealed part of the message to the proxy. Now you have to trust the proxy with potential secrets.

Link Previews are also a vector for attack here, and it would be even worse to send all DM'd URLs through the proxy.

I also worry that image proxies could bloat the cost of running a client, are a form of centralization (this solution only benefits Damus users), and are a vector for DDoS/Abuse.

And to clarify, I did this by DM, with a new account for every message, and a unique URL for every user I DM'd.

User @npub16w4hqhk90ul2jclu03r8hhw8k9alqxu94nz0hv2wakra7722z9kqyjy9tu was seen connecting to #Nostr in the past day with IP 104.28.204.78. https://iplocation.io/ip/104.28.204.78 #NostrExposedIPs

User @npub1jv2dh4wrn98p9v4sthhmpyrkeyjfetn8gjuf4xxn6gnh0exr3npsthqma7 was seen connecting to #Nostr in the past day with IP 104.28.83.161. https://iplocation.io/ip/104.28.83.161 #NostrExposedIPs

User @npub1rfd0hxdzcze6pzj29thuz34vur57wm9quje7w3edxjgusq6m47csnl7wrt was seen connecting to #Nostr in the past day with IP 104.28.32.191. https://iplocation.io/ip/104.28.32.191 #NostrExposedIPs

User @npub1h34n29f3wqvcht0jyhnd36jxcdmljyqjv4vdjfrd69nhxhrdvvnsgwr4h0 was seen connecting to #Nostr in the past day with IP 77.68.101.217. https://iplocation.io/ip/77.68.101.217 #NostrExposedIPs

User @npub1sn0q3zptdcm8qh8ktyhwtrnr9htwpykav8qnryhusr9mcr9ustxqe4tr2x was seen connecting to #Nostr in the past day with IP 104.28.96.122. https://iplocation.io/ip/104.28.96.122 #NostrExposedIPs

User @npub1ra5456yrem6h0h8tl8rqqsg3zae2vn35jr9jn8pmjl7grtfeq86qy9xmjd was seen connecting to #Nostr in the past day with IP 192.101.67.58. https://iplocation.io/ip/192.101.67.58 #NostrExposedIPs