I ripped off nostr:npub14mgq3zmg7wc4g5exw6yztlfaypapcvee06quc5msdqujpa6e5d4sztw00t page: https://lnpay.me/
- add point of sale app, product list style, add each "button" as a product
- btcpay > server settings > policies > customization (Display app on website root)
what did you use to expose on clearnet?
Everything is done through the cloudflare dashboard (no ssh/terminal commands needed). Just install the service, fill in your token and manage everything from the CF Zero Trust dashboard. The only requirement is that you know your way around the Cloudflare dashboard. Which yea, maybe is a bit technical :)
And use Zeus to directly connect to my node to be able to manage channels and receive/send invoices.
I'm using StartOS with cloudflare zero trust tunnels. I can access all (http) services from a public domain, with SSL. Not exposing my home IP directly, and also avoid routing through TOR. Running BTCPayServer with Nostr plugin to receive zaps directly to my node. The free tiers of cloudflare also offer some basic ddos and bot protection. It has been working perfectly.
Fix is up ;-)
- Created tx in Sparrow
- Scanned using Coldcard Q
- Signed
- Tap my phone on the Colcard
- Transaction published to my node, running on StartOS
(this is on testnet4)

https://github.com/remcoros/pushtx-startos/
nostr:note1ds2m9nehznqlsvgpvxla0guy3g7tftmvydlfxvdarjtktmeugfaqeemf5v
Working on a Coldcard's PushTX implementation for StartOS:
PSBT ==[SD|QR|NFC]==> COLDCARD signed TXN ==[NFC tap]==> Phone Browser ==> TXN Broadcast to your own node
Huge milestone: First demo of Nostr Web Services (NWS) bringing TCP to Nostr. With NWS, you can host any existing web application on Nostr without having to use DNS or even announce your public IP to the world, simply by sharing your service's npub (or nprofile).
Try it out the demo yourself. Here is a Cashu test mint running with NWS. Let's use curl to retrieve the mint's information. The request travels from your computer to the public NWS entry relay, then through nostr to the service's NWS exit relay. At the other end is a Cashu mint with HTTPS encryption.
```
curl -s -x socks5h://relay.8333.space:8882 https://nprofile1qqs8a8nk09fhrxylcd42haz8ev4cprhnk5egntvs0whafvaaxpk8plgpzemhxue69uhhyetvv9ujuwpnxvejuumsv93k2g6k9kr/v1/info --insecure | jq
```

I can't stress this enough: THE MINT RUNS BEHIND HTTPS!
The NWS entry relay can't read your traffic. It's encrypted. We can host public entry relays that can be used by anyone.
This means we can plug the entire internet to it 🌐.
Let's plug it into Cashu for now. Nutshell wallet supports socks5 proxies (that's how it uses Tor). By setting the public entry relay as the proxy, the wallet can now connect to a mint's npub/nprofile and communicate with it via NWS.

This is going to be so freaking cool. And it's going to be a lot more useful than just for Cashu. There are still bugs and issues that need to be ironed out but the code is coming out soon. Watch this space.
So this is SOCKS5 over JSON messages over Websockets over HTTP over TCP/IP... did I miss any layers?
Cool stuff, but I don't know how viable this will be in the long run.
nostr:npub167hmfzj38hkumks4wxny89797la0sf7wnwfrw4enlmcl82msp0cs78schc 2.1.0 is now available on the nostr:npub126ntw5mnermmj0znhjhgdk8lh2af72sm8qfzq48umdlnhaj9kuns3le9ll / #StartOS beta community marketplace: https://marketplace.start9.com/wasabi-webtop?api=community-beta-registry.start9.com&name=Community%20Beta%20Registry
Access your favorite privacy-focused wallet through a web-browser, running 24/7 on StartOS.
Now available on the Community Marketplace:
nostr:note1wypcekzuhfkh2qwdcdka9fanywt0v92rzz6qzf9p63nmh0k66ltqnn094p
const clearly states intent, it's good for longevity of the code especially with multiple maintainers. Not sure about performance, I can imagine a runtime can make some assumptions for performance if it knows it's a const.
Uptime Kuma has a 'TCP port' monitor also, which can ping port 8332/8333 of bitcoind for example.
nostr:npub167hmfzj38hkumks4wxny89797la0sf7wnwfrw4enlmcl82msp0cs78schc 2.1.0 is now available on the nostr:npub126ntw5mnermmj0znhjhgdk8lh2af72sm8qfzq48umdlnhaj9kuns3le9ll / #StartOS beta community marketplace: https://marketplace.start9.com/wasabi-webtop?api=community-beta-registry.start9.com&name=Community%20Beta%20Registry
Access your favorite privacy-focused wallet through a web-browser, running 24/7 on StartOS.
OAuth/OIDC flows are perfect for this, no need to reinvent the wheel and OIDC support in libraries/frameworks is pretty solid these days. Which makes integrating this in apps quiet easy I suppose if you can expose OIDC compliant "nsec bunker" endpoints.
If you're going the cloudflare tunnel route, I created a startos wrapper for cloudflared, which makes setting this up very easy: https://github.com/remcoros/cloudflared-startos
asking for a friend planning a boat trip?
Monitor anything and setup Status pages from your #Start9 #StartOS server using Uptime Kuma:

Soon on the marketplace, or help beta test by installing from: https://github.com/remcoros/uptime-kuma-startos/releases
Read the instructions on how to setup monitoring for .onion URLs using StartOS built-in TOR support.

