Constant

Constant's avatar
Constant
Constant@techno-ethica.com
npub1t6jx...ksrw
Writing a book about Nostr Ceterum censeo NIP-03 omnibus esse utendum
Some TEPP q&a. More info, documentation and explainers will follow soon. Read my operation kidstr articles for more info or visit weboftrustfoundation.com View quoted note → The system can run at any level, so it could run at the bunker/signer, and/or the client (and/or the relay, but not a likely place for this to run). Obviously it would require implementation, so yeah you'd need a 'special' client (as is the case with any NIP), but if you have it running on a signer/bunker, you can use any client out there and still get most of the benefits of the system. View quoted note → You say you don't want it to be public that your child is running under this scheme, but im not so sure if that is an obvious possition. The scheme allows to encrypt the specific permissions as to hide what the social network etc. That info can indeed be sensitive, but as for it being a child in the first place...that cuts both ways: Sure preditors can use it as an indication for targetting; but well meaning actors (say for instance a relay that has 18+ content) could actively block interaction with those type of npubs. At the same time, the whole point of TEPP is to protect children from preditors in the first place, and you can wonder if preditors really need to rely on the existence of association events to find their prey. View quoted note → This is not specified yet, but yes you want a way out of the association event; this is not impossible but i have simply not mentioned a concrete suggestion as of yet. Indeed the idea behind the system is that children can just continue using their existing keypair into the future.