<oembed><type>rich</type><version>1.0</version><title>tyiu wrote</title><author_name>tyiu (npub1ya…tvjmf)</author_name><author_url>https://yabu.me/npub1yaul8k059377u9lsu67de7y637w4jtgeuwcmh5n7788l6xnlnrgs3tvjmf</author_url><provider_name>njump</provider_name><provider_url>https://yabu.me</provider_url><html>nostr:npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z nostr:npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn I’m having trouble wrapping (no pun intended) my head around the one-time use random keypair used to sign the kind 1059 gift wrap event. If I want to see the NIP-17 DMs that I’ve sent from my client, would I have to keep track of the random keypairs that I’ve used so that I can decrypt the gift wrap content and render them in the future? Alternatively, would I just need to store the seal events locally on my client?&#xA;&#xA;Context: I’m adding NIP-17 DM support to Nostr SDK for Apple Platforms and the randomized keypair stuff on the gift wrap confused me.</html></oembed>