Closed alopatindev closed 4 months ago
That sounds good. I believe that should be required for all signers implementations.
I agree, I think it should be updated in the NIP.
Optional secret is consumed and one-time in gossip. So I concur.
same with nsecbunker; one time only.
Consider the following flow:
bunker://
URI with optional secrettype="password"
wnj input field and successfully establishes connection after clicking on Amber notificationThat's unlikely, but perhaps UN has actually read entire NIP-46 multiple times and he carefully reads every mobile notification. But even then he could accidentally click on the malicious notification if it appeared just before attempt to click on some other one.
Ideally I'd never want to see any signer notifications if Stranger tries to establish a new session using the same URI with the same optional secret key. I just don't expect it; I expect a single endless session for a single app I granted for the single device. Perhaps "app" is the wrong concept here, it's actually a session (and "secret" is actually a token).
If it's not possible, at least I expect a signer implementation requirement for explicit warning that the long line of the copied text is not safe to transmit over untrusted channels.