mleku on Nostr: hint: you can't derive the shared secret without the secret. it's one step. one. ...
hint: you can't derive the shared secret without the secret. it's one step. one.
security of the nsec and derived secrets is almost unity
the actual data it decrypts, that's your computer it's on, it's not being SENT ANYIWHERE ffs guys, please, get some fucking realism in your threat models
if you can't trust the computer, why you use the computer?
oh yeah, because it isn't a leaky sponge like you are trying to make it out to be, yet somehow it is secure in other ways
no, fuck you. decrypted messages are adjacent to the fucking nsec
security of the nsec and derived secrets is almost unity
the actual data it decrypts, that's your computer it's on, it's not being SENT ANYIWHERE ffs guys, please, get some fucking realism in your threat models
if you can't trust the computer, why you use the computer?
oh yeah, because it isn't a leaky sponge like you are trying to make it out to be, yet somehow it is secure in other ways
no, fuck you. decrypted messages are adjacent to the fucking nsec