Thread

Here is a demo of a new onboarding flow for nostr applications. I started working on this after watching @rabble's keynote "Nostr for normies" at @Nostriga; which I highly recommend watching. My goal here was to create a way to onboard new users without requiring them to: * install a browser extension * copy/paste a secret * explain npub/nsec stuff * without losing interoperability with other nostr applications This flow resembles a lot an OAuth style (e.g. "Login with twitter") flow: * You create an account in one site (e.g. Twitter) * You can "login" to another site with that account * You can revoke access from using your account Behind the scenes this is using NIP-89 to find nsecBunkers that allow people to register an account in their domain. This means that any nostr application can offer a signup/login flow on any nsecBunker domain. The application itself doesn't take custody nor ever see the generated key. And what's cool is that any nsecBunker provider can create their own flow; they can use passwords, or not, they can require a payment or proof-of-work to create an account. They can brand their "signup/login" popup page in whatever way they want. Here is a demo video of this new building block that is now available to nostr applications.

Replies (39)

cant wait to have this feature on nostri.chat please ! Eversince I added nostrichat to my legacy website , I have received at least five queries about nsec and stuff (log in) .. and eventually forced them to go anonymous .. and hence cant even reply to them :-) This would be a lifesaver . Last thing you wanna teach the world is a new way to "log in" .. That said , I do love the idea that nostr users understand the significance of npub and nsec ... I guess that should be reveled to users once they get comfortable with more compelling features of nostr such as zaps .. linking to gravatar is an awesome idea .. open and free ..
Que faire pour obtenir enfin ce NUP05 et qu'elle extension est rรฉellement adaptรฉe aux mobiles ? Lร  oรน c'est trรจs problรฉmatique pour les utilisateurs non issus de la Tech. J'ai dรป investir sur le Bitcoin mais gรฉrรฉ par mon ami techniquement mรชme si tout le monde parle de gestion de clรฉs savez que c'est fort compliquรฉ entre nos autres prรฉoccupations et prioritรฉs de gรฉrer ses clรฉs.. Peut-รชtre je me trompe...
Merci beaucoup Pablo de mon cรดtรฉ je peine ร  contribuer aux zaps nul n'a pas m'expliquer comment faire avec mon mobile et Getalby pour zapper j'ai notรฉ que WSatodhi ne fonctionne plus sur les usa.. Lequel serait plus adรฉquat sur Android entre Zeus Bolt mutiny etc.. .. Il y en a tellement avec les publicitรฉs rรฉcurrentes de nostriches et clients en fonction d'1 objectif type sur une journรฉe type que je m'y perds rรฉellement et ne pense รชtre la seule. Raison pour laquelle je ne veux point associer mes Bitcoins ร  mon compte nostr ๐Ÿคจ
I think this has the potential to change the way we think about network security. The ride or die freaks think about security differently from organizations. We are all about Szabo's famous quote, "trusted third parties are security holes," and take extreme measures to ensure no one else has access to our keys. A hospital or any other business has a gazillion people working for them that all need passwords, 2fa, etc. These are often smart people, but they know about as much as cybersecurity as I know about brain surgery. The way places deal with this is host files in the cloud with a trusted third party who has the most liability they can find. All the hashes of the passwords are stored in a central location, making them an easy target. From what I understand, this does the opposite. The keys are encrypted on the client, not the server. An attacker needs pysical access to the computer for the key. This mitigates the risk of social engineering attacks. If there is a breach, the key can be revoked. This won't stop nprmies from writing their password on a post-it under the keyboard, but that's okay. Most of the people in the office have a password of their own. It's still a bad idea, maybe a jealous co-worker finds your password and searches porn sites, but it's less likely to end up on the news. That's what I think anyway. Please correct me if I'm wrong. I am sure there are some things I've missed too.
I think any client that sits at the top of the onboarding funnel it would make sense to run these things. I am planning on building a bunch of non-bitcoiner-focused apps that will leverage this. I think this would also make a lot of sense for something like @npub1zach...5dy5 's Flockstr to run (in fact, Zach came up with a username+password scheme as well but which the strings themselves compute to a key, so you would be essentially logging in to all clients directly with your nsec, which is why I think that approach is problematic, but same goal!)
Its quite simple really; Itโ€™s just a 31990 with a k-tag of the NIP-46 kind (24344 or something) and the 31990 profile data should have a _@domain as its NIP-05 that validly resolves to the pubkey that published the 31990. If you want to peak under the hood the fans site I showed in the video is already deployed so you can play around with what I used to make the demo video (although Iโ€™m not 100% certain that I deployed the most recent version)
No doubt this approach is the better way to go. From my experience onboarding people, they often love the idea of nostr but are left wondering what to do next. I think as @rabble suggests, we should rework the nostr.com site to be more of a normie onboarding tool than a dev-focused protocol explainer. Something that clearly outlines a bunch of example nostr usecases beyond traditional microblogging. If we could build in a great onboarding experience directly on nostr.com, that would be awesome.
ใƒ‘ใƒ–ใƒญใŒใพใŸใชใ‚“ใ‹ไฝœใฃใŸใ€‚ "ใ“ใ“ใงใฎ็งใฎ็›ฎๆจ™ใฏใ€ๆ–ฐใ—ใ„ใƒฆใƒผใ‚ถใƒผใซไปฅไธ‹ใ‚’่ฆๆฑ‚ใ›ใšใซใ‚ชใƒณใƒœใƒผใƒ‰ใ™ใ‚‹ๆ–นๆณ•ใ‚’ไฝœๆˆใ™ใ‚‹ใ“ใจใงใ—ใŸ: * ใƒ–ใƒฉใ‚ฆใ‚ถๆ‹กๅผตๆฉŸ่ƒฝใ‚’ใ‚คใƒณใ‚นใƒˆใƒผใƒซใ™ใ‚‹ * ็ง˜ๅฏ†ใ‚’ใ‚ณใƒ”ใƒผใ™ใ‚‹ * npub/nsec ใฎๅ†…ๅฎนใ‚’่ชฌๆ˜Žใ™ใ‚‹ * ไป–ใฎ nostr ใ‚ขใƒ—ใƒชใ‚ฑใƒผใ‚ทใƒงใƒณใจใฎ็›ธไบ’้‹็”จๆ€งใ‚’ๅคฑใ†ใ“ใจใชใ" View quoted note โ†’
Yeah, the account creation part where you enter the email and username etc is in-page modal, but then the password stuff must happen on the popup so the client generating the account canโ€™t see it. It could be done getting absolutely everything in the client but that increases the trust significantly with the client and you also want the nsecBunker domain to have a cookie to authorize new keys without having to login. Iโ€™d say that would only make sense if the client and nsecBunker provider are the same entity in that case that would be fine.