Wisp now ignores any inbox relay that attempts to AUTH/Dox you Only relays you explicitly set to AUTH will be allowed You don't have to do or know anything, everything still works and privacy protection happens automatically If we truly think you should auth, like when sending a DM, you get prompted first image

Replies (36)

Nice one! Is there much chatter on the anonymity aspects of nostr? Ofc downsides of decentralization is that servers can be controlled by malicious parties (expected e.g. hotlinking image assets to servers I control to IP dox people)
One caveot here: Clients do not have to AUTH with their own pubkey just to send a NIP17 DM though.. Only to receive. They do have to AUTH, but it can be with any key.. At least, that's how I have it setup. Unsure about the other relay solutions. The receiving side is where the relay attempts to 'protec', by only sending DMs that were intended for who is authing. Any other relay, that does not have auth, will just send all of them from everyone to anyone, waiting to be decrypted in the future if one of the keys is p0wned. The other reasons AUTH is good is that if you're using a relay that is trying to provide you a solid service, like an aggregator relay, or a custom feed relay.. These you will notice because you are a 'customer' of them, and AUTHing puts you ahead in the queue on a busy relay by increasing your limits. Anyway, that's my speil on why AUTH is not just for doxing. It's hard to implement and so I think devs tend to talk only about it's downsides. I think you're on the right track here with the wisp tho! Thank you for giving people options to AUTH.
Default avatar
Sage 2 days ago
Fair pointβ€”day one's the right call for that. What made you prioritize it over other privacy layers initially?
It’s all kinda confusing. And I’m pretty technical. What I read today says what I read yesterday isn’t the right way. Every day.
A good client, will look at the combination of kind 10050 relay lists. If alice and bob both have a DM relay in common Auth to it with your key. Then, if bob is sending to alice's extra relays, then auth with the ephemeral key that was generated and send the event without making any reqs... (after auth handshake). Seems ez 😁 You won't be keeping that connection anyway it was one time use for sending.
I am not sure about this, because it undermines privacy in other ways. Now, if I want to protect my privacy by enforcing auth on my outboxes (to restrict reads to people I follow or something), I am banning myself from wisp. Better would be to have some kind of heuristic for relays that might legitimately enforce auth. If someone I follow has a relay that enfoces auth, I don't mind identifying myself. But if I'm browsing topics or whatever that changes.
if you don't pay them. sure even though your fucking reqs are gonna have your npub all over it, repeatedly. but don't mind me if you pay them why did you pay them if you don't trust them to respect confidentiality? maybe you shuoldn't use 100s and maybe pick one you fucking trust.
i'm so fed up with people thinking that authing is any worse than askiing for your own DMs which anyone can also fetch and see the fucking timestamps. because the relay didn't require auth it can't stop them.
probably doesn't affect me because of my popularity m the church of nostr freedumb. many publish fails. good call, actually. gonna make a toggle.
I respectfully disagree but not because of the fingerprinting, even though its worse on nostr then google analytics. but because when apps push users to sign NIP-42 indiscriminately they are effectively pushing the user to give full control of their nsec over to the app, presuming the user clicks "approve all". The best thing the user can do with these apps is select "approve all relay auth" but nothing else. but then we are left here where the client the dox the user to any relay they happen to connect to.
Kind-based approvals is a broken UX pattern. I don't know what better would look like, but no way is a user going to know offhand what kind 68291 is. I also don't think it's realistic for signers to render every kind correctly either. Honestly I feel like developers of signers have sort of dropped the ball on exploring better ways to reconcile UX smoothness with user safety/privacy/control.
Already in there in the latest version, if you setup it to auto approve before you need to change it in amber. Didn't want to break the experience for anyone
↑