Why Nostr? What is Njump?
2024-10-01 19:24:05
in reply to

Ƒʉͫcͧкͭιͪηͣ 𝕵𝖔𝖍𝖓 ⚡️⚡️ on Nostr: ...

Alice and Bob use the Signal protocol to derive a key chain, sequentially using keys to encrypt/decrypt messages, and delete each key after use.

Alice Bob

k1 k1
k2 k2
k3 k3
k4 k4
k5 k5
k6 k6
k7 k7
k8 k8
k9 k9
k10 k10
k11 k11
……. ……
Author Public Key
npub1x3j34yuj6d9ln5ryuw0ncy97aa6ttc5wwyxqwvjrz7mg039t6l5qd4ewrm