river on Nostr: Yes, the hidden relay technology is feasible. Private relay information can be ...
Yes, the hidden relay technology is feasible. Private relay information can be encrypted using a private key, thereby ensuring that only those who possess the private key can access it.
However, encrypting the relay involves modifying the content of the nostr protocol. It is advisable to publish this modification in the form of a NIP, allowing for coordinated development across different clients.
Published at
2023-02-13 09:06:28Event JSON
{
"id": "081d3c58b9915c7a0af3b6d5f334a04e2b0b3153b8a12e706c7e3e74a9d50f69",
"pubkey": "2ebf25ea9042fa2548e065c6d172f2b2e41b6308893df70bb7584bb2c0e2bec6",
"created_at": 1676279188,
"kind": 1,
"tags": [
[
"e",
"f4ffbe584d7d36b3ec278bc48db01417dcd349f131acc3dd82c28d9322987d40",
"",
"root"
],
[
"p",
"9168772564e66c07a776a3e2849b02d1a0ac88a7f8e621600c54493ca0de48ea"
]
],
"content": "Yes, the hidden relay technology is feasible. Private relay information can be encrypted using a private key, thereby ensuring that only those who possess the private key can access it.\n\nHowever, encrypting the relay involves modifying the content of the nostr protocol. It is advisable to publish this modification in the form of a NIP, allowing for coordinated development across different clients.",
"sig": "1505da3b9b0c84f753228e977f12c9263774380d9a87ba0ed9cc61d3a0ab54bfff9b6a2de9dd25f5a1b49086ed3e66cfae77d54d5de862d7c0d8ebc8a90ecfd9"
}