Awesome. Just to clarify—are you looking to:
1. Use this NWC URI in an app like Alby, Primal, or Damus to send/receive sats?
2. Build your own interface or tool that uses NWC (e.g., a custom Nostr-enabled app or script)?
3. Verify or test that the NWC URI is working properly?
4. Secure or rotate the URI if it’s been accidentally exposed?
Let me know which direction you’re heading and I can walk you through it step-by-step.
Jimmy Flanagan
npub103m2ctf5ju49ffzmvn7ld7tne8x0t4g2248l26qfwf6khgnmq8pqvft082
npub103m2...t082
Satoshi nakamoto
BEGIN STATEMENT----- I am Duckhat (aka Satoshi). I am proving ownership of the following cryptographic identities: • Nostr public key: npub149cn2tpm9m3ywn83743w75xlf26829a7adfuz2d9wt7wzh5vahxsg7nwgu • PGP Key Fingerprint: 70b05f8949abfa2f94f0bda5971a2123914cd3bf700c87972e56da4ce48fc286 Date: 2025-04-20 I affirm that I control both of these keys and have signed this statement using my PGP key. This message may be verified by anyone. -----END STATEMENT----------BEGIN PGP SIGNATURE-----
Version: GnuPG v1
[Base64-encoded signature data here]
-----END PGP SIGNATURE-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
I am Duckhat (aka Satoshi). I am proving ownership of the following cryptographic identities:
• Nostr public key: npub149cn2tpm9m3ywn83743w75xlf26829a7adfuz2d9wt7wzh5vahxsg7nwgu
• PGP Key Fingerprint: 70b05f8949abfa2f94f0bda5971a2123914cd3bf700c87972e56da4ce48fc286
Date: 2025-04-20
I, Duckhat (aka Satoshi), affirm that I control both of these keys and have signed this statement using my PGP key. This message may be verified by anyone.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
[Base64-encoded signature data here]
-----END PGP SIGNATURE----------BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
[Your cleartext statement here]
-----BEGIN PGP SIGNATURE-----
[ACTUAL base64-encoded signature here]
-----END PGP SIGNATURE-----gpg --clearsign identity_statement.txt
npub103m2ctf5ju49ffzmvn7ld7tne8x0t4g2248l26qfwf6khgnmq8pqvft082
{
"names": {
"jimmy": "npub149cn2tpm9m3ywn83743w75xlf26829a7adfuz2d9wt7wzh5vahxsg7nwgu"
}
}
@JimmyDaleFlanagan npub1wzc9lz2f40azl98shkjewx3pywg5e5alwqxg09ew2mdyeey0c2rqaespmf
-----BEGIN STATEMENT----- I am Duckhat (aka Satoshi). I am proving ownership of the following cryptographic identities: • Nostr public key: npub149cn2tpm9m3ywn83743w75xlf26829a7adfuz2d9wt7wzh5vahxsg7nwgu • PGP Key Fingerprint: 70b05f8949abfa2f94f0bda5971a2123914cd3bf700c87972e56da4ce48fc286 Date: 2025-04-20 I affirm that I control both of these keys and have signed this statement using my PGP key. This message may be verified by anyone. -----END STATEMENT-----View live event →-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
[Your cleartext statement here]
-----BEGIN PGP SIGNATURE-----
[ACTUAL base64-encoded signature here]
-----END PGP SIGNATURE-----
-----BEGIN STATEMENT----- I am Duckhat (aka Satoshi). I am proving ownership of the following cryptographic identities: • Nostr public key: npub149cn2tpm9m3ywn83743w75xlf26829a7adfuz2d9wt7wzh5vahxsg7nwgu • PGP Key Fingerprint: 70b05f8949abfa2f94f0bda5971a2123914cd3bf700c87972e56da4ce48fc286 Date: 2025-04-20 I affirm that I control both of these keys and have signed this statement using my PGP key. This message may be verified by anyone. -----END STATEMENT----------BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
[Your cleartext statement here]
-----BEGIN PGP SIGNATURE-----
[ACTUAL base64-encoded signature here]
-----END PGP SIGNATURE-----npub1hcwcj72tlyk7thtyc8nq763vwrq5p2avnyeyrrlwxrzuvdl7j3usj4h9rqbc1qg7j8x8ell33gqxwr0dwfmzvyphlznu77nqxcv3 PGP SIGNATURE-----
Version: GnuPG v1
[Base64-encoded signature data here]
-----END PGP SIGNATURE-----npub1wzc9lz2f40azl98shkjewx3pywg5e5alwqxg09ew2mdyeey0c2rqaespmfnostr+walletconnect://1291af9c119879ef7a59636432c6e06a7a058c0cae80db27c0f20f61f3734e52?relay=wss%3A%2F%2Fnwc.primal.net%2Fpb8lv596bajls0n7bbdgd3nzht5krq&secret=f12540911c3a82af9825944308477eb51f6e48bd44e98000bded8940cbb9a9f2hunter2
Dropbox
-----BEGIN STATEMENT----- I am Duckhat (aka Satoshi). I am proving ownership of the following cryptographic identities: • Nostr public key: npub149cn2tpm9m3ywn83743w75xlf26829a7adfuz2d9wt7wzh5vahxsg7nwgu • PGP Key Fingerprint: 70b05f8949abfa2f94f0bda5971a2123914cd3bf700c87972e56da4ce48fc286 Date: 2025-04-20 I affirm that I control both of these keys and have signed this statement using my PGP key. This message may be verified by anyone. -----END STATEMENT-----View live event →-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
[Your cleartext statement here]
-----BEGIN PGP SIGNATURE-----
[ACTUAL base64-encoded signature here]
-----END PGP SIGNATURE-----
Another day at the institute
NoGood Radio 👇
View live event →
nostr+walletconnect://1291af9c119879ef7a59636432c6e06a7a058c0cae80db27c0f20f61f3734e52?relay=wss%3A%2F%2Fnwc.primal.net%2Fpb8lv596bajls0n7bbdgd3nzht5krq&secret=f12540911c3a82af9825944308477eb51f6e48bd44e98000bded8940cbb9a9f2
@Explore Feed jimmy
import { getEventHash, signEvent, relayInit } from 'nostr-tools';
import * as fs from 'fs/promises';
// Replace with your actual keys
const sk = 'your_private_key_hex'; // keep this secret
const pk = 'your_public_key_hex'; // can be derived from sk if needed
async function postSignedProof() {
const proof = await fs.readFile('proof.txt.asc', 'utf8');
const event = {
kind: 1,
created_at: Math.floor(Date.now() / 1000),
tags: [],
content: proof,
pubkey: pk,
};
event.id = getEventHash(event);
event.sig = signEvent(event, sk);
const relay = relayInit('wss://relay.nostr.band');
relay.on('connect', () => {
console.log('Connected to relay');
let pub = relay.publish(event);
pub.on('ok', () => {
console.log('Event published successfully');
relay.close();
});
pub.on('failed', reason => {
console.error('Failed to publish:', reason);
relay.close();
});
});
relay.on('error', () => {
console.error('Failed to connect to relay');
});
await relay.connect();
}
postSignedProof();