Dr. Hax on Nostr: The first two cases seem nearly identical. Having diagrams for each use case showing ...
The first two cases seem nearly identical.
Having diagrams for each use case showing how the messages spead under the different use cases would be helpful. It could also show how/why one note in use case C may go to relays A, B, and C, while a second note goes to relays C, X, Y, and Z.
If you haven't already looked into Briar and understand why they only pass messages to trusted individuals for transport, I'd recommend it. Decide up front whether you want to protect people's metadata. Whatever you decide, please make it clear to users what is and is not protected.
You could also consider using the Briar protocol as your underlying transport. Their chat app is just one example of what their protocol can do. What you are trying to do looks very similar top their goals in several ways.
Having diagrams for each use case showing how the messages spead under the different use cases would be helpful. It could also show how/why one note in use case C may go to relays A, B, and C, while a second note goes to relays C, X, Y, and Z.
If you haven't already looked into Briar and understand why they only pass messages to trusted individuals for transport, I'd recommend it. Decide up front whether you want to protect people's metadata. Whatever you decide, please make it clear to users what is and is not protected.
You could also consider using the Briar protocol as your underlying transport. Their chat app is just one example of what their protocol can do. What you are trying to do looks very similar top their goals in several ways.