White Noise's avatar
White Noise 5 months ago
@Keychat has NIP17 messages, while White Noise is MLS only. With NIP17 anyone who has your nsec sees all your messages. With MLS only the active device gets messages and with the nsec you don't get old messages. Hopefully Keychat and White Noise will be interoperable one day!

Replies (3)

Keychat's avatar
Keychat 5 months ago
If we compare it like this, I’m not sure how to explain it. Users can use multiple IDs, including a microblog ID—the post below is intended for Nostr Microblog DMs.
Keychat's avatar Keychat
In Keychat, you can set an ID to be only a Chat ID, only a Browser ID, or both a Chat ID and a Browser ID. Currently, if you log in to Keychat with your microblog ID and set it as your Chat ID, you can receive Nostr DMs (nip4 or nip17) in Keychat when someone sends them to you. However, Keychat does not support replying to messages via nip4. We are still considering how to improve this. image
View quoted note →
White Noise's avatar
White Noise 5 months ago
This is a much better explanation of the difference!
Keychat's avatar Keychat
Many people are curious about the difference between Keychat and White Noise. Keychat encrypts one-to-one chats and small groups with the Signal protocol, while large groups use MLS encryption. White Noise, by contrast, encrypts every message solely with MLS. Think of each message as a letter: both Keychat and White Noise rely on OpenMLS to encrypt the content inside. The main distinction lies in the envelope—the format of the recipient address and how that address rotates. For large-group messages, Keychat adopts exactly the same envelope as a Nostr direct message (NIP-17), blending the traffic so thoroughly that an outside observer cannot distinguish a Keychat message from a Nostr DM. Why does Keychat choose the Signal protocol over MLS for one-to-one chats? Because Signal’s ratchet advances more frequently than MLS’s, providing stronger post-compromise security. Could Keychat’s large groups interoperate with White Noise’s groups in the future? Quite possible—after all, the two are already 90 % identical. View quoted note →
View quoted note →
Doesn't Keychat use ecash 'blind signatures' stamps also? How's White Noise going to address spam on relays if only the group ID is known? Auth would reveal metadata and a different emphemeral key use used to sign each event? Blind signatures seem ideal here.