-
Notifications
You must be signed in to change notification settings - Fork 721
Secure DM #978
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secure DM #978
Conversation
|
This seems fine, but again, similar to NIP 101. I'd also like to see zaps as an alternative to PoW. That wouldn't help relays since they can't verify zaps, but recipients could fetch zaps, validate them, then fetch the envelopes that the zaps tagged. This is preferable to PoW for me because the work expended is durable rather than disposable. It also allows for senders to bid or receivers to set different thresholds for message requests. |
|
@staab Can't open issue there at the NIP-101 repo nor there is a PR to comment on. @water783 if you ever read this, I think NIP-101 is more complex because:
|
|
@staab zaps aren't an alternative to PoW cause of the relay part you mentioned. Zaps could be used in addition to PoW though. I admit that atm I'm a bit lazy to open NIP-57 and figure out how to stuff it in here xD |
@mikedilger could you review these lines? New sessions would not be able to decrypt previous DMs after discarding previous session's privkey (it's chars are used as salt for decrypting the old DMs). |
|
Just a question, if the session-key for A & B to another one, and if it also add C's pubkey to the p tag. it can become private group chat? |
|
@mattn edit: Short answer: no. #875 seems to be a good private group chat spec. I'm not sure if you want to add Either way, we would need some type of chat room identifier to add to the edit: Also the |
590fe9b to
ca92dcc
Compare
38b0c8d to
7287e07
Compare
2a0db64 to
1415d76
Compare
274e385 to
a5c9dc7
Compare
|
Added new device usage detection to help identify unauthorized privkey access. In my mind the flow works but it may have a flaw I may be missing. The idea is simple: a hacker with my privkey won't be able to read my messages nor talk to someone until it reveals his device id (called LID - any random string local to the client/device) to the other chat participant (peer). Then the peer will broadcast the hacker's LID (using a LID Tracker Event) so that I can compare it with my own LID. If it is different than mine and I hadn't used a new device recently, someone else accessed my account. |
Read here