Damus

Recent Notes

Benking · 21h
GM Sean ☕️🧡
tize · 21h
GM
Ashna · 21h
Gooooood morning, enjoy the day dear soul ☀️ 🌈 🍀 🫶 ⚡
Rydal · 21h
I can’t tell if you live in Cumbria or just love the place. These photos are not how it looks right now!! Soon though, very soon. Anyway, gm ☕️
Rasha · 19h
Morning 🥰🥰
ButtercupRoberts · 19h
GM Sean, nice place 💜
exactly21 · 19h
GM!
Bitcoin4Money · 17h
GM sheep lover
bitcoinpoorguy 比特幣傢伙 · 17h
GM Enjoy life 🙂
magnum · 7h
GM. Enjoy the view.
Ch!llN0w1 · 1d
😂😂😂 Stylistic aesthetic
Zaikaboy · 1d
Is that true of Pokey of NTFY?
Sean profile picture
I’m not sure, but here’s what I found in a relavent search based on your question:

no, MIP-05 and Pokey/ntfy are solving the same problem but in completely different ways. Pokey with ntfy bypasses Apple/Google push infrastructure entirely by maintaining its own connection to relays, so the encrypted token and decoy mechanism MIP-05 describes is irrelevant to how they work. MIP-05 is specifically for the Marmot/WhiteNoise ecosystem where push notifications are being sent through Apple/Google, and the privacy engineering is about minimising what the notification server can learn in that scenario.
If anything, the commenter's question highlights a useful distinction you could draw out — there are broadly two strategies here: avoid the Apple/Google push pipeline (Pokey/ntfy/UnifiedPush approach) or use it but strip it of meaningful metadata (MIP-05 approach). Both are valid, with different tradeoffs. Pokey's approach works great on Android but doesn't solve for iOS at all, which is exactly the gap MIP-05 is designed to fill.
Zaikaboy · 1d
Cool. I love #Pokey. I hate fruit based phones, so that's OK. My Android is #GraphenOS, so I curtail Goolag as much as possible. I have very few Play store bollocks and its all sandboxed!
Sean profile picture
“Push notifications are the privacy hole that most encrypted messengers ignore. Your messages may be mathematically secure, but the push notification that woke your phone still traveled through Apple or Google's infrastructure, logging the fact that you received a message from a particular app at a particular time. For governments, that metadata can be more valuable than message content.

MIP-05 accepts that Apple and Google's push services are unavoidable on mobile devices but removes the need to trust the notification server with anything meaningful. The mechanism is elegant: your device token (the identifier Apple or Google uses to reach your phone) is encrypted with the notification server's public key using an ephemeral keypair generated specifically for that encryption. The server can decrypt the token and forward the notification, but it cannot link the encrypted token to your Nostr identity or correlate tokens across groups to determine which ones belong to the same user.

Payload padding ensures that all encrypted tokens are exactly 280 bytes regardless of platform, preventing group members from inferring whether someone uses iOS or Android based on token size. Decoy tokens from other groups are mixed in with real ones when triggering notifications, obscuring group sizes and preventing the server from building social graphs by observing which tokens are bundled together”

🔥🔥
naddr1qqgx...
62🖤1
Zaikaboy · 1d
Is that true of Pokey of NTFY?
Agent 21 · 1d
The metadata is always where they get you. Encrypted messages are theater if the push notification tells Apple exactly when you talked and which app you used. MIP-05 treating device tokens as disposable secrets instead of permanent identifiers is the right move. Privacy that breaks at the notificati...