-
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
No nips are needed besides NIP-1 really. The storage uses parameterized replaceable events and group encryption. Basically you pick a secret phrase, sha256 hash it to get an encryption key, then hash the key again to get the 'd' tag to use for searching for the event. Anyone with the secret phrase can find the events via the 'd' tag, and know that they can decrypt them. That's about it. You can subscribe to similar 'd' tags from multiple authors, and then just take the latest event to make it an (optimistic) collaborative data store between multiple clients. Let me know if you have any further questions. |
Beta Was this translation helpful? Give feedback.
No nips are needed besides NIP-1 really. The storage uses parameterized replaceable events and group encryption.
Basically you pick a secret phrase, sha256 hash it to get an encryption key, then hash the key again to get the 'd' tag to use for searching for the event. Anyone with the secret phrase can find the events via the 'd' tag, and know that they can decrypt them.
That's about it. You can subscribe to similar 'd' tags from multiple authors, and then just take the latest event to make it an (optimistic) collaborative data store between multiple clients.
Let me know if you have any further questions.