Avatar
arthurfranca
fc7085c383ba71745704bdc1c6efcf7fab0197501de598c5e6c537ac0b32a4cb
Software dev + graphic designer + Nostr enthusiast https://github.com/arthurfranca
Replying to Avatar arthurfranca

Just launched a campaign at Geyser: https://geyser.fund/project/44billion/prelaunch

Apparently it will auto-close if it doesn't reach $210 goal 😱😱😱😱

If you like the project, please contribute or share to your follows!

*followers

Just launched a campaign at Geyser: https://geyser.fund/project/44billion/prelaunch

Apparently it will auto-close if it doesn't reach $210 goal 😱😱😱😱

If you like the project, please contribute or share to your follows!

I feel so light using js without typescript!

Best nostr clients hands-down:

yakihonne for Android and cobrafuma.com

I've read the MLS NIP and its PoC app code. 🙊

From talking to chatgpt, yes NIP-17 is safer.

A Signal group chat member can provide chat read-only access to anyone, without revealing their own main private key, while with NIP-17 the member would need to reveal it.

Signal chat member could simply keep sending a flow of up-to-date group keys and of received messages for anyone to be able to decrypt (showing not only the plaintext messages but who signed them), without admins or other members noticing it.

Chatgpt may be wrong, though, but the logic seems correct.

yeah I wonder if what you said could really bring in a considerable amount of sats.

maybe I could make a closed source nostr app and apply for an opensats or similar grant to turn it into open source and support further development 🤔

After much thought, I came up with a great (unreleased) NIP

that keeps nostr keys safe without an increase in complexity.

But this v4v thing doesn't seem to be working for protocol specs.

Sats income after 1.7 years of contributions: 1363 sats =O~

Rate-limiting by IP (for example, how fast an user can read or write nostr events) is the most widely used technique to reduce spam on servers that don't require user login.

If nostr gets popular, there will be millions of simultaneous active users.

There are ~2000 tor exit IPs.

If clients start defaulting to using tor for all their users, expect to be heavily rate-limited by most relays.

nip96 at start of PR dicussions had fixed routes with no nip96 config, just like blossom, but stakeholders wanted to specify custom api url to serve files from a different infra. download_url is optionally for using CDNs. Other keys are all optional.

Also nip96 servers, specially free ones, may want to compress images/videos. That's why the file identifier is the file hash before compression. When using blossom, the client is supposed to compress before uploading.