cmd on Nostr: I don't think they are that different. Both strings are using URI schemes and share ...
I don't think they are that different. Both strings are using URI schemes and share many of the same arguments. It's just a matter of who initiates the authentication flow.
If everyone runs something like NIP-46 (including client sites) then it essentially becomes sessions + permissions managment for peers, with the connect strings as an out-of-band way to initiate the session. It can be bidirectional.
Once a session is established, the methods available can be anything. I'm planning to add bitcoin and lightning methods.
Published at
2025-06-05 18:57:54Event JSON
{
"id": "b3cee4023794b71b8599877410c00d487c3205a1652ae737c91acd35a80006b9",
"pubkey": "4229c21f0101abc3ba45233e176e975fa9e671bb18a6722bdf7726ba25445ff9",
"created_at": 1749149874,
"kind": 1,
"tags": [
[
"p",
"4229c21f0101abc3ba45233e176e975fa9e671bb18a6722bdf7726ba25445ff9",
"wss://relay.snort.social/",
"cmd"
],
[
"p",
"97c70a44366a6535c145b333f973ea86dfdc2d7a99da618c40c64705ad98e322",
"wss://relay.damus.io/%20wss://relay.notoshi.win/%20wss://nos.lol/%20wss://relay.siamstr.com/%20wss://relay.0xchat.com/%20wss://nfrelay.app/%20wss://relayrs.notoshi.win/%20wss://relay.nexterz.com/%20wss://fenrir-s.notoshi.win"
],
[
"p",
"4229c21f0101abc3ba45233e176e975fa9e671bb18a6722bdf7726ba25445ff9",
"wss://nostr-pub.wellorder.net"
],
[
"e",
"296612a6a14a6414dbc24ca8dff564b514248f3fc9e8c8f2ceff367d922f15ee",
"wss://relay.damus.io/%20wss://relay.notoshi.win/%20wss://nos.lol/%20wss://relay.siamstr.com/%20wss://relay.0xchat.com/%20wss://nfrelay.app/%20wss://relayrs.notoshi.win/%20wss://relay.nexterz.com/%20wss://fenrir-s.notoshi.win",
"reply",
"97c70a44366a6535c145b333f973ea86dfdc2d7a99da618c40c64705ad98e322"
],
[
"e",
"eec8f504fd111fb9a35be679269c9c7c197d6c123333e0f5bf1bef49b4c905e0",
"wss://nostr-pub.wellorder.net",
"root",
"4229c21f0101abc3ba45233e176e975fa9e671bb18a6722bdf7726ba25445ff9"
]
],
"content": "I don't think they are that different. Both strings are using URI schemes and share many of the same arguments. It's just a matter of who initiates the authentication flow.\n\nIf everyone runs something like NIP-46 (including client sites) then it essentially becomes sessions + permissions managment for peers, with the connect strings as an out-of-band way to initiate the session. It can be bidirectional.\n\nOnce a session is established, the methods available can be anything. I'm planning to add bitcoin and lightning methods.",
"sig": "8d6bdcb83de01a1af8dca8025db0c7b8c222111744e65f89d155c994efb1f2ea3b8d554ccd1235f699cdfebbebdd38083c6f42613a3846e942dcedeaeb290cfa"
}