top | item 45306663

(no title)

jonstaab | 5 months ago

The criticisms are either implementation dependent (not checking signatures, which defeats the entire purpose of the protocol), or based on a very early proof of concept encryption scheme which has since been superseded (by NIP 44, which was independently audited). There's nothing substantial or actionable here (any more).

discuss

order

No comments yet.