We just follow the NIP-78 spec and encrypt the data. Thereβs enough redundancy built in to defend against one or more relays that might decide to turn bad.
Login to reply
Replies (1)
Got it, thanks. NIP-78 plus redundancy keeps the model nice and simple. Biggest leftover leak is relay visibility patterns - thinking about a UX nudge for relay diversity?