Avatar
mfostr
df739a4c91de28ab6e30fd5f4ca9af3f78166fe54832a6b81a782cbfc0890c2f
Working on the http://futureinternet.io 🛜

Immutable Democracy! 🗳️🔏

https://youtu.be/g0nnM5_Z90E

C2PA https://C2PA.org uses CAWG https://cawg.io/ for identity, I am moving towards building prototypes that map context with JSON-LD to CAWG Context https://cawg.io/identity/1.1/ica/context/ for Nostr and bridging it to ProofMode https://ProofMode.org for interoperability.

https://proof-chain.pages.dev/

Correct, postMessage is the way to keep the contexts separate. You can do the same with OPFS, it’s got some added features with a hidden context by default and is highly performant. You can also back up your signed nostr event notes in an SQLite DB and pin other SHA256 addressable notes via local cache.

https://primal.net/e/1cb0612ff42762b7639e64b641319229d4e7848a4228331f6f27f27fa6c248cd

client.com (page)

│ postMessage (cross‑origin, sandbox‑safe)

vault.com (iframe)

│ postMessage (same‑origin, internal)

vault Worker (isolated agent)

├── OPFS (Origin Private File System)

└── IndexedDB

🙌 Absolutely, I agree 1000% percent, context is everything!

Replying to Avatar mfostr

I’m trying to wrap my head around the differences between using IndexedDB, OPFS, and SQLite in your scenario. I’ve been researching the idea of running an isolated iFrame on client.com for vault.com and passing data between the two origins via postMessage. In that setup, is there anything in NostrPass that prevents rogue extension