keychat on Nostr: The privacy leakage of metadata in encrypted messaging can be divided into two ...
The privacy leakage of metadata in encrypted messaging can be divided into two levels: application level and network level.
At the application level, using registered accounts as addresses makes it easy for server to know who is messaging whom. A better practice would be to use different and updated sending and receiving addresses for each message.
At the network level, metadata privacy is compromised when the user's client connects to the server, as the server can identify the user's IP address. Network level issues can only be solved at the network level. MASQUE Proxy holds great promise for addressing network level metadata privacy issues.
At the application level, using registered accounts as addresses makes it easy for server to know who is messaging whom. A better practice would be to use different and updated sending and receiving addresses for each message.
At the network level, metadata privacy is compromised when the user's client connects to the server, as the server can identify the user's IP address. Network level issues can only be solved at the network level. MASQUE Proxy holds great promise for addressing network level metadata privacy issues.
quoting note1qz7…fhtsWhy doesn’t Nostr have encrypted messaging on par with Signal yet? yonson (npub1jy2…9p6d) explains https://blog.yonson.dev/log/2024-06-vol2/