Oh I see. Big brain.
Interesting. But then is it possible for the receiver to verify the origin of the message?
What is your threat model for 1? Leaking the message after it has been received or during transit?
GM kind strangers
Test
I think something like this would be pretty neat if you're going to break backwards compatibility:
https://perkeep.org/doc/json-signing/
Iirc this would allow for arbitrary json fields without using the tags hack as it done now.
Certified nostr ooga booga moment
nostr:note1w3f527lhxd37gs8dsxtj2ljxp9hfdevh9pk537kk82p9990uedwsp6e7gd
Hi, I haven't looked into it a lot but Mutiny seems to be able to do it. Does the wallet need to be online all the time or can payments be approved asynchronously?
Does this work?
cashuAeyJ0b2tlbiI6W3sibWludCI6Imh0dHBzOi8vbWludC5taW5pYml0cy5jYXNoL0JpdGNvaW4iLCJwcm9vZnMiOlt7ImlkIjoiMDA1MDA1NTBmMDQ5NDE0NiIsImFtb3VudCI6Miwic2VjcmV0IjoiNXN5NzdTU2Rwd2Vwc2RvNlY1d0l2SVErbDVLdHVyUDlud2U5cFgvc2NSTT0iLCJDIjoiMDNlYmNmMmJiOGJhNTM3YTlmNTQxZGI1OGYzYzRlYzgxNDhjZjBhZjI0YTc3ODI5Y2M2MWMzNWFkNTUyZjc2YzM4In0seyJpZCI6IjAwNTAwNTUwZjA0OTQxNDYiLCJhbW91bnQiOjgsInNlY3JldCI6Ik1NK2JHa1NFd2p6RWRWZ1FJUUwyRDBNRlAwT0gxMGlRdkJCaFBBSWF0NlE9IiwiQyI6IjAyZWM2MjFkMTdhODVhZWU2MzRlZTE4ZGUxZDcyZmQxMzlmMDhlMDY2MDAxOTBlZmZkYzA0Yzg2NDNmOGVlOWFiYSJ9XX1dLCJtZW1vIjoiSGVsbG8gOikifQ
Haha fair.
That is one of the things I like the most about nostrmo. It has nested replies and it's super easy to know what's going on. Sometimes it freaks out if the conversation is super long tho.
Primal on the other hand is super weird IMO because it hides nested replies and you have to click on the parent to see them.
nostr:npub1kvaln6tm0re4d99q9e4ma788wpvnw0jzkz595cljtfgwhldd75xsj9tkzv Do you plan on adding NWC support to minibits?
I guess to get all past keys you need full device access where leaking an nsec can be done "easily" by putting it into a malicious website or app.
Afaik 0xchat does this by creating ephemeral keys that are then stored to be able to decrypt old messages. If any of the keys are leaked, then only a subset of the messages can be decrypted (I'm not sure how many, might be just one). But then this also goes the other way: if you don't have access to those keys anymore, then your DMs are gone. I guess it's just a matter of tradeoffs.
This is not true, implementing a protocol with forward secrecy would stop an attacker from reading past DMs if the nsec is leaked.

