pull down to refresh

You can try the QR code on Github or this one:
Clicking on the QR code on Github also works
reply
It seems to me that nostr is not suitable for anonymous chats. There are already many other good solutions
reply
Agreed. Better to not go down too far down the path. Terrible foundation for chat, espeically if something is intended to be "anonymous"
reply
I like the ease of use because it's just a key pair.
I don't know of any other service where you can simply generate a key pair and then send encrypted DMs to another key pair (which could also be generated on demand which I don't do here, to be fair).
Isn't that as anonymous as it can be on clearnet?
Or are you concerned because of the current state of NIP-04?
reply
ease of use
Like PGP? And some things are complicated for a reason. Simple doesn't mean you should use it.
concerned because of the current state of NIP-04
That's putting it lightly.
reply
No, PGP is hard to use right. (edit: Talking about usage over SMTP here)
I think you are talking more generally about using nostr for anonymous chats. Generally, I agree. Nostr is bad to stay anonymous.
However, I don't see how ephemeral key pairs as used here are not anonymous. I am talking about this specific use case where a random person just wants to contact you to exchange a few messages and then the key will never be used again.
Maybe I should be more clear: It's about the anonymity of the sender, I don't generate a new key pair for the recipient side (yet). So I am indeed not anonymous here.
reply
I guess I don't really get what's the point of the project then. I just see a QR code and a github repo that says "anonymouse chat!"
Not trying to dismiss it or discourage development, but I don't see the point nor understand the claims being made.
Which do you have in mind?
reply
As far as I remember, nostr now has metadata about who sent messages to whom and when. This is not enough for complete anonymity. Though I may not have gotten the point.)
reply
Yes, NIP-04 leaks metadata as it is. But since one key pair will never be reused (at least that's my intention), I thought this should still be "anonymous".
I could also create a new ephemeral key pair for the recipient side. Then I think metadata shouldn't matter.
But I could be wrong of course.
reply
This option can be useful for one-time short chats, but not for long-term communication.
reply
Yes, I agree. That's why it's called ephemeral: new key pairs are generated every time you reload the page.
You didn't say which other solutions you were talking about. I would be interested in them.
reply
For example this: https://simplex.chat/
Not much harder to use, but more secure and much more anonymous. It doesn't even have a user ID.
reply
Oh, right, I think SimpleX was also mentioned in the discussions about how to improve NIP-04 but I didn't take a look at it yet. Thanks for reminding me!
This looks indeed really promising.
Maybe I can implement the protocol for my use case with QR codes.
Thanks again!
Like it! 👏👏👏
reply
I replied to two people coming from Github but I think I replied too late and the session was already closed, haha
Sorry for being slow!
edit: Oh, I found a bug. An old tab of mine (15min+ old) could still send messages but did not receive messages anymore. I think I need to check subscription states regularly and reconnect if they are closed.
reply