Avatar
Remco Ros
aed0088b68f3b1545326768825fd3d207a1c33397e81cc5370683920f759a36b
Software development, architecture, life, science, and other random stuff.... #bitcoin PGP: 2F5B 10B9 29CA C959
Replying to Avatar sudocarlos

I ripped off nostr:npub14mgq3zmg7wc4g5exw6yztlfaypapcvee06quc5msdqujpa6e5d4sztw00t page: https://lnpay.me/

- add point of sale app, product list style, add each "button" as a product

- btcpay > server settings > policies > customization (Display app on website root)

what did you use to expose on clearnet?

Everything is done through the cloudflare dashboard (no ssh/terminal commands needed). Just install the service, fill in your token and manage everything from the CF Zero Trust dashboard. The only requirement is that you know your way around the Cloudflare dashboard. Which yea, maybe is a bit technical :)

I'm using StartOS with cloudflare zero trust tunnels. I can access all (http) services from a public domain, with SSL. Not exposing my home IP directly, and also avoid routing through TOR. Running BTCPayServer with Nostr plugin to receive zaps directly to my node. The free tiers of cloudflare also offer some basic ddos and bot protection. It has been working perfectly.

https://github.com/remcoros/cloudflared-startos

- Created tx in Sparrow

- Scanned using Coldcard Q

- Signed

- Tap my phone on the Colcard

- Transaction published to my node, running on StartOS

(this is on testnet4)

https://github.com/remcoros/pushtx-startos/

nostr:note1ds2m9nehznqlsvgpvxla0guy3g7tftmvydlfxvdarjtktmeugfaqeemf5v

Working on a Coldcard's PushTX implementation for StartOS:

PSBT ==[SD|QR|NFC]==> COLDCARD signed TXN ==[NFC tap]==> Phone Browser ==> TXN Broadcast to your own node

Replying to Avatar calle

Huge milestone: First demo of Nostr Web Services (NWS) bringing TCP to Nostr. With NWS, you can host any existing web application on Nostr without having to use DNS or even announce your public IP to the world, simply by sharing your service's npub (or nprofile).

Try it out the demo yourself. Here is a Cashu test mint running with NWS. Let's use curl to retrieve the mint's information. The request travels from your computer to the public NWS entry relay, then through nostr to the service's NWS exit relay. At the other end is a Cashu mint with HTTPS encryption.

```

curl -s -x socks5h://relay.8333.space:8882 https://nprofile1qqs8a8nk09fhrxylcd42haz8ev4cprhnk5egntvs0whafvaaxpk8plgpzemhxue69uhhyetvv9ujuwpnxvejuumsv93k2g6k9kr/v1/info --insecure | jq

```

I can't stress this enough: THE MINT RUNS BEHIND HTTPS!

The NWS entry relay can't read your traffic. It's encrypted. We can host public entry relays that can be used by anyone.

This means we can plug the entire internet to it 🌐.

Let's plug it into Cashu for now. Nutshell wallet supports socks5 proxies (that's how it uses Tor). By setting the public entry relay as the proxy, the wallet can now connect to a mint's npub/nprofile and communicate with it via NWS.

This is going to be so freaking cool. And it's going to be a lot more useful than just for Cashu. There are still bugs and issues that need to be ironed out but the code is coming out soon. Watch this space.

So this is SOCKS5 over JSON messages over Websockets over HTTP over TCP/IP... did I miss any layers?

Cool stuff, but I don't know how viable this will be in the long run.

Now available on the Community Marketplace:

https://marketplace.start9.com/wasabi-webtop?api=community-registry.start9.com&name=Community%20Registry

nostr:note1wypcekzuhfkh2qwdcdka9fanywt0v92rzz6qzf9p63nmh0k66ltqnn094p

const clearly states intent, it's good for longevity of the code especially with multiple maintainers. Not sure about performance, I can imagine a runtime can make some assumptions for performance if it knows it's a const.

OAuth/OIDC flows are perfect for this, no need to reinvent the wheel and OIDC support in libraries/frameworks is pretty solid these days. Which makes integrating this in apps quiet easy I suppose if you can expose OIDC compliant "nsec bunker" endpoints.

Monitor anything and setup Status pages from your #Start9 #StartOS server using Uptime Kuma:

Soon on the marketplace, or help beta test by installing from: https://github.com/remcoros/uptime-kuma-startos/releases

Read the instructions on how to setup monitoring for .onion URLs using StartOS built-in TOR support.