Secondly, remember on nostr , the relay is the “server” god knows what weaknesses can be exposed there with different relay implementations.
Login to reply
Replies (1)
Hmm 🤔 nothing can beat a signature verification, and all of this are signed notes