I haven't tested lspub yet but if it's nostr keys are not one time use then that ought to be fixed imo
There's no reason to use your real identity to purchase a channel -- spin up a a fake one for every purchase
Your point about needing a node pubkey anyway is a good one, I will start brainstorming a way to easily use a new node pubkey for every channel too
Login to reply
Replies (3)
The current implementation of publsp autogenerates new keys at startup if none are found, then saves those to file. Each subsequent startup will try reading that file to see if keys are there to use. I figured that was a reasonable trade-off to reduce friction, and to avoid potential confusion if the tool automatically regenerates new keys each time. But you bring up a good point. This could just be a new option the user sets to deliberately create new keys each time, or the opposite, to keep the existing keys each time. I guess either opt-in or opt-out but the user is made aware.
On the receiving LN node privacy issue, I think that's a separate problem to tackle. In the end, the LSP needs to know where to open the channel so it can't be avoided, but there's no reason that the receiving nodes can't be one-offs, for example.
I wonder if it'd be possible to obfuscate the receiving node pubkey similar to how NIP-17 private messages obfuscate the receiver key?
Just pushed an update to expose an option on the cli to reuse keys
Default behavior is to auto rotate keys on startup, so users have to opt-in to reuse. Thanks for the idea!
GitHub
added cli option to reuse nostr keys, default is auto key rotation · smallworlnd/publsp@21cdce8
LN liquidity offers/purchases over Nostr. Contribute to smallworlnd/publsp development by creating an account on GitHub.