Oh hey, hi, hello.
So...if any of you could just go ahead and update the remote signing spec with a little flag that tells the client that the signer is taking care of publishing the event, so we can have a class of bunkers that also does publication to relays next to the current type of signers that don't....
And then if y'all could just update to the new spec, that would be great.
Ok thnx, bye.
But no, seriously, what would make more sense?
Trying to update the existing standard?
Introduce a new standard that is 99.99% the same as the existing one?
Force the existing standard to change eventually by just be a ''bad'' actor as a signer by simply throwing back error codes to the client instead of signed events, so things do actually work but the experience is just ugly?
Login to reply
Replies (5)
@npub1m2jp...3wgu ๐ณ
Maybe i get it wrong but the whole idea of a signer is that it sorta adds security. You can use it offline or even better: airgapped. Why would you also want to burden it with broadcasting events? Then it must be online in at least a one-way fashion. Clients are made for receiving and sending out events, so it makes very little sense to me to have to write an event and then have it signed by the signer who also does the sending.
It could be that i am just misinterpreting something so correct me if i'm wrong.
these are all different things.
The reason for a remote signer COULD be the airgapped security consideration you mentioned; but how many hardwarewallet-type signers that are currently in use that work that way in Nostr are you aware of?
Most are, in fact, internet connected, but then added benefit is that you can reduce attack surface, like amber is doing for example.
At the same time, the added value can also just simply be the fact that only 1 thing has your keys instead of having to trust all the clients that you use with your keys (+ the need to handle those keys to load them into the clients in the first place).
Before i go into the reason why i would want to burden the signer with publication, please note that im not saying that should, all i am proposing is a silly little flag such that clients know that they are; the current mode of operation where they don't would still just exist.
As for the reason:
Im designing this ''Trust Extended Permissions Protocol'' (TEPP) to create permissioned Nostr environments for (example/mostly) children. This system can run at many places at the same time (clients, signers, even relays although not super likely).
It should work well enough in the current paradigm, but signers would still be fairly limited in what they can control for; mainly the stuff related to what relays events are send to (which is something the system does allow you to determine). That means that that part would have to be implemented by the clients.
Thats not the end of the world, but from a TEPP perspective, it would make things easier and better if a bunch more effort is put into a hefty TEPP complient signer that also handles publication, such that it matters a whole lot less if clients even implemented TEPP in the first place; and subsequently it would allow for clients to have a half assed TEPP implementation, but when paired to this ''super signer'', would still basically cover all the bases.
For more context:
View article โ
This sounds interesting. I'll read the TEPP article and think about it some. There's some potential issues with rolling this into NIP-46 but let me make sure I'm not overthinking it.
Ignore tepp for all i care, just the notion of a signer that broadcasts and send back succes messages instead of signed events is all im asking for