Followed 🤙
Thanks will update my NIP-05 guide to add that note.
All good!
GM! 🌅
Yes, I think signing or authorizing events via the hardware wallet using NFC, PSBT via microSD or cable connection would be good options to use on a spare ColdCard not connected to your main Bitcoin stash (just a me being more paranoid approach). However, I don’t know yet if ColdCard will bring this in it’s update with Nostr Tools. Haven’t found much info on it yet.
I agree, this is their [tweet](https://twitter.com/COLDCARDwallet/status/1608886079159160834) about it.
You could go into ColdCard and derive a child key with BIP-85, once you do that you can enter the following in your browser console offline to generate the Nostr hex private key form that child seed:
```
[...new Uint8Array(await crypto.subtle.digest('SHA-256', new TextEncoder().encode('disorder dish either velvet insect session rigid rough work path bean release')))].map((b) => b.toString(16).padStart(2, '0')).join('')
```
Also, replace your seed in that.
I agree, this is their [tweet](https://twitter.com/COLDCARDwallet/status/1608886079159160834) about it.
You could go into ColdCard and derive a child key with BIP-85, once you do that you can enter the following in your browser console offline to generate the Nostr hex private key form that child seed:
```
[...new Uint8Array(await crypto.subtle.digest('SHA-256', new TextEncoder().encode('disorder dish either velvet insect session rigid rough work path bean release')))].map((b) => b.toString(16).padStart(2, '0')).join('')
```
This is still a browser way to do it. Wait for the coldcard Nostr tools to do it on the hardware wallet itself.
I agree, this is their [tweet](https://twitter.com/COLDCARDwallet/status/1608886079159160834) about it.
You could go into ColdCard and derive a child key with BIP-85, once you do that you can enter the following in your browser console offline to generate the Nostr hex private key form that child seed:
```
[...new Uint8Array(await crypto.subtle.digest('SHA-256', new TextEncoder().encode('disorder dish either velvet insect session rigid rough work path bean release')))].map((b) => b.toString(16).padStart(2, '0')).join('')
```
Could use a BIP85 seed from ColdCadd. Also they are adding a Nostr tools option soon.
You could use also this tool offline https://github.com/jeffthibault/python-nostr
Or just type in console:
`openssl rand -hex 32` to generate hex
and login.
Also, another tool to generate key offline https://github.com/jb55/nostril
Could use a BIP85 seed from ColdCadd. Also they are adding a Nostr tools option soon.
You could use also this tool offline https://github.com/jeffthibault/python-nostr
Or just type in console:
`openssl rand -hex 32` to generate hex
and login.
- Nostros https://github.com/KoalaSat/nostros/ (starting to look good and work fine)
- https://www.neb.lol/nostr (newly released very alpha)
Apart from that there are browser clients like snort.social, hamstr.to, astral.ninja, iris.to, coracle.social and few others I forgot to bookmark.
It would be nice for clients to check for frequency of posts and replies and maybe content? But I feel these can be bypassed too. After the check is done I guess report it to relays, relays could also gossip and block publeys and IPs as a rate limit.
That’s very interesting and I agree, might need a tool that looks at the
Followers list to identify NIP verified followers from certain domains. On Twitter I guess the entry barrier is the phone number and email, but I think the phone number can be reused to create fake accounts.
I pronounce it as Nostra.
Home feed all day! 🤙
You got me with that one! 😂
You’re welcome 😄🤙🤙
New spam with spam tool https://github.com/gourcetools/spamster
- New iOS (Testflight) and Android client Daisy - https://www.neb.lol/nostr
- New Nostr tool to spam https://github.com/gourcetools/spamster
- Nostream relay updated to v1.17.0
- jb55 working on Lightning Zap for Damus