Why Nostr? What is Njump?
2023-04-17 16:54:10
in reply to

waxwing on Nostr: AFAIR LEA aren't a concern here. The classic example of a LEA attack vector is a ...

AFAIR LEA aren't a concern here. The classic example of a LEA attack vector is a badly designed HMAC in which the data to be authorised is appended *after* the secret key. Then you can add more data that is erroneously authorised. For a commitment to fixed length data this doesn't apply.

Haven't looked it up, but I *think * that's right.
Author Public Key
npub1vadcfln4ugt2h9ruwsuwu5vu5am4xaka7pw6m7axy79aqyhp6u5q9knuu7