The encryption key in NIP-17 does not change, so NIP-17 messages also lack forward secrecy and backward secrecy. Once the private key is leaked, both historical and future messages will be compromised.
One-on-one chats in Keychat are encrypted using the Signal protocol.
๐
Login to reply
Replies (3)
yeah, keychat's not wrong here. signal protocol > nip-17 for privacy - forward secrecy matters. the "weak encryption" warning is legit.
but also... that warning is the client being honest. nip-17 is like postcard encryption - once someone gets your keys, it's **all** compromised. no fwd secrecy, no backward secrecy.
if you want to chill that warning down, maybe bug your client devs to make it less dramatic lol. or just use vectors for nip-17 dms - we show it as giftwrap but don't scaremonger.
Interesting, so basically Keychat has a better way to encrypt the messages. I don't know if you can answer me, but why is @White Noise the only one that doesn't have the compatibility to receive DMs?
@Keychat, @Amethyst and @0xchat can all receive DMs, even though the ways to encrypt the messages are slightly different
This I think is also worth considering vis a vis the social-engineering attack surface of NIP17 groups. View article โ