protocol

Nostr NIPS 08

Warning unrecommended: deprecated in favor of NIP-27 NIP-08 Handling Mentions final unrecommended optional This document standardizes the treatment given by clients of inline mentions of other events and pubkeys inside the content of text_notes. Clients that want to allow tagged mentions they MUST show an autocomplete component or something analogous to that whenever the user starts typing a special key (for example, “@”) or presses some button to include a mention etc – or these clients can come up with other ways to unambiguously differentiate between mentions and normal text.

Nostr NIPS 09

NIP-09 Event Deletion draft optional A special event with kind 5, meaning “deletion” is defined as having a list of one or more e tags, each referencing an event the author is requesting to be deleted. Each tag entry must contain an “e” event id and/or a tags intended for deletion. The event’s content field MAY contain a text note describing the reason for the deletion. For example: { "kind": 5, "pubkey": <32-bytes hex-encoded public key of the event creator>, "tags": [ ["e", "dcd59.

Nostr NIPS 11

NIP-11 Relay Information Document draft optional Relays may provide server metadata to clients to inform them of capabilities, administrative contacts, and various server attributes. This is made available as a JSON document over HTTP, on the same URI as the relay’s websocket. When a relay receives an HTTP(s) request with an Accept header of application/nostr+json to a URI supporting WebSocket upgrades, they SHOULD return a document with the following structure.

Nostr NIPS 12

NIP-12 Generic Tag Queries final mandatory Moved to NIP-01 . Source: nostr-protocol/nips/12.md version: 37f6cbb 2023-11-15T21:42:51-03:00

Verify Certificate Transparency Record in Java

A single java file to query Certificate Transparency log records and verification. Introduction Certificate Transparency (CT) depends on independent, reliable logs because it is a distributed ecosystem. Built using Merkle trees, logs are publicly verifiable, append-only, and tamper-proof. Logs are publicly available and monitored. How CT works Certificates are deposited in public, transparent logs Certificate logs are append-only ledgers of certificates. Because they’re distributed and independent, anyone can query them to see what certificates have been included and when.

Nostr protocol in a single page

NIPs NIPs stand for Nostr Implementation Possibilities. They exist to document what may be implemented by Nostr -compatible relay and client software. List Event Kinds Message Types Client to Relay Relay to Client Standardized Tags Criteria for acceptance of NIPs Is this repository a centralizing factor? How this repository works Breaking Changes License List NIP-01: Basic protocol flow description NIP-02: Follow List NIP-03: OpenTimestamps Attestations for Events NIP-04: Encrypted Direct Message — unrecommended: deprecated in favor of NIP-17 NIP-05: Mapping Nostr keys to DNS-based internet identifiers NIP-06: Basic key derivation from mnemonic seed phrase NIP-07: window.