Avatar
Zapstore
78ce6faa72264387284e647ba6938995735ec8c7d5c5a65737e55130f026307d
The open app store powered by your social network Download 0.2.7 for Android: https://zapstore.dev/ SHA-256 checksum: 800b9048974dfcac4e1e1b9afe0812d15e42a08264ba0b8877e22c2e6d2221ae APK certificate hash (for AppVerifier): 99e33b0c2d07e75fcd9df7e40e886646ff667e3aa6648e1a1160b036cf2b9320 Technical support: https://signal.group/#CjQKIK20nMOglqNT8KYw4ZeyChsvA14TTcjtjuC2VF6j6nB5EhDLZ7pQHvOeopr36jq431ow (do not use Nostr DMs)

Unbelievable, Apple. Not even browsing offline.

Try the following: put your phone in airplane mode and try opening zap.store. You can kill the app and relaunch. Most of the UI just works.

We do it better than Apple.

Local-first FTW

nostr:nevent1qqsdeejtrn0kwnu4a0gu8sccdy5u28dm5sz8kxw22r2c8y9gmpwxsjspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsyg8s4xdlr3gs45nfvff7dj4hnwc8ws280c986uj85mxknl98d9gduupsgqqqqqqsewg4zm

Inspect the source code and build the APK yourself. There is a file integrity hash check and an APK certificate hash check but Android enforces this validation anyway.

For first installs you're choosing to trust AppVerifier and not zap.store, that's okay. I can't change who you trust.

However, developers will start signing apps via nostr events so on zap.store you'll be able to check that with your web of trust (via a service or manually)

Ouch. Can you share your device info via DM? Go to the settings screen and tap on system info to copy it

Replying to Avatar Zapstore

Who's going to be in nostr:nprofile1qqsfc93uwdgl3qetpz6kewewp9vkp5w9qcxadv8yv85p8u8sw3v3r8sprdmhxue69uhkummnw3ez6ur4vgh8xetdd9ek7mpwv3jhvqgewaehxw309ac82unpwe5kgcfwdehhxarj9ekxzmnyqy28wumn8ghj7un9d3shjtnyv9kh2uewd9hsrce5ph?

Thinking of submitting a "Sign your apps" workshop for developers who want to start self-signing their apps on nostr.

We could explore the (upcoming) dev signing tool and its options, publish CLI and Android apps, and go over the NIPs that power all this.

nostr:nprofile1qqs83nn04fezvsu89p8xg7axjwye2u67errat3dx2um725fs7qnrqlgpz4mhxue69uhhyetvv9ujumn0wd68ytnzvuhs8kht6h heyy maybe there could be something wrong in update checker, fossify notes has an update on github from some days but still no update on zap.store

also a new added app github.com/amnesica/ClearClipboard is not in the store

🙏🫡

Both updates are failing because it's impossible for the indexer to determine the architectures those APKs can run on.

It's mostly that APK is a complete shitshow of a standard, and some devs produce them in weird ways.

Who's going to be in nostr:nprofile1qqsfc93uwdgl3qetpz6kewewp9vkp5w9qcxadv8yv85p8u8sw3v3r8sprdmhxue69uhkummnw3ez6ur4vgh8xetdd9ek7mpwv3jhvqgewaehxw309ac82unpwe5kgcfwdehhxarj9ekxzmnyqy28wumn8ghj7un9d3shjtnyv9kh2uewd9hsrce5ph?

Thinking of submitting a "Sign your apps" workshop for developers who want to start self-signing their apps on nostr.

We could explore the (upcoming) dev signing tool and its options, publish CLI and Android apps, and go over the NIPs that power all this.

Nostr or the like wont be involved for Accrescent, it's been designed to compliment GrapheneOS to be a private and secure app store in the same fashion that GrapheneOS is. There had been interests for us using Accrescent for a long time and this addition coming in a time where people are into using other app stores is just a coincidence. Accrescent has been in active development and maintenance since 2021 and we had expressed interest to mirror it in our Apps app for a while.

> Accrescent's catalog is maintained by a respected community member and checks dev signatures on a third-party database on Github. Correct me if I'm wrong.

This is not done through GitHub rather Accrescent's own hosted infrastructure. When you open the app it will download the current repository metadata JSON which has the app names, ID, signing cert hashes, etc.

> Users will be able to cryptographically verify an artifact came from a developer using nostr. They can do so directly, relying on a web-of-trust check, or indirectly via curators (choose your own walled gardens).

For Accrescent, apps are verified by key pinning of the apps and signing of the app store's repository data. The repository is signed by Accrescent and verified with the repository data public key (hard coded into the app) before it can be fetched. It has downgrade protection and also has a minimum revision hard coded to protect against being served old metadata on first use. It also can support key rotation.

Downloading an app will make the client check the signed repository metadata and compare the app's certificate hash, minimum version, and app name from the signed repository metadata. If any of the parameters do not match it will not install the app for you. For updates it does not matter as Android won't let you update apps with a different certificate than your currently installed version.

Minimum version protects against first install of an insecure, older version, and app name protects against malicious copycat apps.

When someone submits an app on the Accrescent developer console (whitelist only right now) for the first time, it will put a hash of their app's signing key to the repository metadata. This makes sure users are only downloading apps by the real developer.

Appreciate your response

Yeah, it works by guessing the best APK right now. That will change with the new signing tool, I will double-check most apps when that is ready

Accrescent's catalog is maintained by a respected community member and checks dev signatures on a third-party database on Github. Correct me if I'm wrong.

While zap.store currently is more or less that, we're aiming to change the status quo trust model.

Users will be able to cryptographically verify an artifact came from a developer using nostr. They can do so directly, relying on a web-of-trust check, or indirectly via curators (choose your own walled gardens).

In addition, we're targeting multiple operating systems and other features like relay-based communities, the ability to zap apps and developers, a marketplace for new apps and more.

Replying to Avatar Ronin

nostr:nprofile1qqs83nn04fezvsu89p8xg7axjwye2u67errat3dx2um725fs7qnrqlgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhs79prlk I have Amethyst installed and Garnet, wich I don't have, appears as update available.

Yes me too. They are reusing the app identifier which is wrong. I will remove it until they fix the issue.

A few more bitcoin wallets available now:

- Breez

- Blitz

- Blixt

If you have other suggestions let us know! Even if it doesn't have a 5-letter B name