Avatar
bullishNuts
c7617e02242f5853fe5b513d411f19b44ad3f0da95a28d33a9b7e927f255dd2d
A bullish Cashu PWA wallet. 🐂🥜⚡️

Maybe you can try the “Remove spent ecash” function in Settings > Backup and recovery.

#bullishNuts v0.0.60 adds an animation as a thank you to those of you who are zapping deez nuts.

The amount of #🥜⚡️ is equal to the amount of sats sent. 😎

Also added JSON export (for debugging) and other fixes/improvements. 🫡

#cashu #bitcoin

https://m.primal.net/JcqG.mov

That’s really great to hear. Thanks so much for testing. Keep the amounts small as I’m sure there will be bugs and hiccups.

I plan to add some of the debugging functionality found in other wallets as soon as I can (e.g. exporting data, checking proofs, etc.) — you know, in case it’s needed.

Replying to Avatar shinohai

If you haven't checked out nostr:npub1cashuq3y9av98ljm2y75z8cek39d8ux6jk3g6vafkl5j0uj4m5ks378fhq PWA yet, yer missing out. I generally hate apps, but this JUST WORKS.

APPRECIATE IT SHINOA 🙏

Replying to Avatar calle

NWS works with and without encrypted transport. There are lots of different flavors to explore.

When used without encryption, the entry node must be run by the user themselves because public entry nodes would be able to listen in otherwise. Two options in those cases: run the entry node locally in tandem with your (unmodified) client, or skip the entry node and modify the client so that data is sent through nostr to the exit node directly (the client is the entry node).

When used with encryption, the entry node can also be public. If the encryption doesn't rely on certificate authorities, it just works. You have to make sure you're talking to the right person, but that problem is as old as computer science. For example, ssh will ask you to confirm the fingerprint of the server when you connect.

If the encryption is https and the certificate was issued for a normal domain, your browser will complain (do you trust this website?) and the user will have to say "let me pass, even if insecure". Without ugly hacks (issuing your own root cert for example), I don't know ways to circumvent this. Note that Tor services doen't support https and they don't have to since transport is always Sphinx-encrypted (even hidden from the entry node).

How do you make sure you're talking to the right server if you use https? Couldn't the entry node just send your traffic somewhete else? We can actually do something that is unique to Nostr here: the exit node can publish its own TLS certificate on nostr and sign it. That's right, you don't need an authority to do that for you if you remain within the NWS system. Clients can fetch the cert from nostr before talking to the entry node and verify against that cert.

Here is another cool part that we haven't talked about yet: the exit node can also be configured to reach the global Internet and not only a local service (we call this NWS v2). In those cases, NWS can be used a bit like a VPN. You can type "https google dot com" in your browser and your encrypted traffic would flow from your machine to the entry node, to the exit node, then to Google and back to you. on those cases, nobody complains about the certificate because everything is fine.

Exciting shit. Gm.

GM 🫡

nostr:note1qu3689tef7lwlsxgevlgx9865xa4r2e83tqr0g9mfzusfgp5z58qsd4t3e

#bullishNuts v0.0.54 improves on the ecash-to-Lightning flow by allowing the selection of a fren from your contacts list.

Test zap to nostr:npub13pnmakf738yn6rv2ex9jgs7924renmderyp5d9rtztsr7ymxg3gqej06vw's npub.cash address.

#cashu #bitcoin

https://m.primal.net/JbCW.mov

You’re welcome! Any tips on recovering the sats that were sent out as an invoice payment? Or would that be an issue on the wallet side (e.g. 0xchat)?

Hey nostr:npub1kvaln6tm0re4d99q9e4ma788wpvnw0jzkz595cljtfgwhldd75xsj9tkzv, are there any known issues at the moment?

Having trouble doing Lightning-related actions (e.g. creating an invoice to receive). Also some payments aren’t making it to the receiving wallet.