Avatar
Azz
7317f913c3de739e83ab2ddc6700a8f5caf45fac5a02c6a886b55ef9b7e34d41
Christian. Bitcoiner 🇦🇺 #AUSTrich Silent payments sp1qq05897wj9atx9l0d0k3u8zdygljwqw0z66hxcwwszegfc5z647z6squn3azn0ul0xcdrc02pvn0wz3wnytq2v8h8y9k4ykx9tvydy85lmchfnha2 Monero 47tSH5HGARmYk5mTdZAfwyZH3zeGbGL841SgtQiQ2xArLjVXre8uLrhbUqMLUvmhiN3pbWFnGfpm392fdNYe5Dr29aQKZjJ

Nostr already is providing a more valuable feed.

In traditional social media only scammers profit from giving (mis)advice.

Giving a truthful answer risks getting banned or attacked

The incentive is not there to add value by being honest.

On nostr zaps reward value and change the incentive dynamics

Evidence that switching from Apple to Android 5 years ago was the right decision

Replying to Avatar Sirius

Iris now supports secret chats that don't leak metadata, implementing the https://hrfbounties.org/ bounty #3. It works also for group messaging.

It's a quick & dirty solution, but works. A shared nostr account is created for the secret chat / group. Its nsec can be shared via link, qr code or invite message from a single-use anonymous account.

Users can then communicate using the shared account's messages-to-self. Iris signs the inner messages with your own key, but the arrangement could be used for anonymous group messaging as well.

I'll also add inner message encryption at some point, so you can ensure that only certain group participants can read the message.

This arrangement doesn't introduce any new event kinds and works also in clients that haven't implemented a special UX for it. You can just log in with the nsec and message yourself.

I had to disable the Iris social graph filter to let invites through, so now Iris DMs are open to spam again, but I'll try to figure out a better solution.

As always, the UX needs a lot of attention, but I believe here's an MVP.

Screenshots:

Alice wants to message Bob:

Alice sends a secret chat invite to Bob:

Bob automatically follows the invite from Alice. They can now message each other in the secret chat:

Here's how the invite looks in another client. I will add an "nostr:ninvite" URI in addition to the nsec.

If nostr can do secret chat without leaking metadata, could it be used for smart device control?

This could help nostr get a foothold in mainstream adoption. Companies that make devices are rarely tech companies, but specialists in lightning, airconditioning, security cameras etc. Unlike twitter or Facebook, they have nothing to lose to an open protocol but would gain from interoperability with other smart devices. Secure platform that doesn't collect user data would be preferable to Google Home. A lot of people bawk at having google listen to their bedroom conversations, who wouldn't bat an eyelid with google knowing their browser history.

nostr:nevent1qqs2qppwjhtud92gjaxg8shp75tdh5aa9phw5suu5pyj6mps0g2d9kqpzpmhxue69uhkummnw3ezuamfdejsygz9ywl935u4kxced2dceq4s8zmgjh9s9d5r6rp98224q6xm58av6qpsgqqqqqqs5nshj6

The difference is the fixed supply vs one that is constantly being debased in waves of credit followed by periods of contractions.

Why is that?