Event JSON
{
"id": "317058b85cfbce940f7fdc1846c4f75b40e8a22dd62fca464e2256cd6e3ebf59",
"pubkey": "4c800257a588a82849d049817c2bdaad984b25a45ad9f6dad66e47d3b47e3b2f",
"created_at": 1744024560,
"kind": 1,
"tags": [
[
"t",
"expiration"
],
[
"e",
"81479b7737cfe6a8bc468c0334c43f915c5cd4554066d2611432e33a3cf66c9e",
"wss://theforest.nostr1.com/",
"root",
"f683e87035f7ad4f44e0b98cfbd9537e16455a92cd38cefc4cb31db7557f5ef2"
],
[
"e",
"2270f70e5dc4f26bc6f2378d7ae5cc2caaf5ba6353c454e4fe85a19d9d4c9171",
"wss://mleku.realy.lol/",
"reply",
"4c800257a588a82849d049817c2bdaad984b25a45ad9f6dad66e47d3b47e3b2f"
],
[
"p",
"f683e87035f7ad4f44e0b98cfbd9537e16455a92cd38cefc4cb31db7557f5ef2"
],
[
"client",
"jumble"
]
],
"content": "https://github.com/mleku/realy/blob/dev/httpauth/98.adoc#expiration-variant this is my addition to NIP-98\n\nif you read the spec right through it is open ended, so technically this variant is permissible already, but this codifies exactly how an expiration can be coded in so the user can explicitly limit how long their identity can be breached by a simple message interception or penetrating a device with one of these tokens in it",
"sig": "852b00d54651c395166ea12ce74815ab5c415657ca9c7ae3213666c7dc4313f60814b0fb916c33ee96f7161a33d11cd4025bf8dd6607eb88ad44fac8b30d5514"
}