“Push notifications are the privacy hole that most encrypted messengers ignore. Your messages may be mathematically secure, but the push notification that woke your phone still traveled through Apple or Google's infrastructure, logging the fact that you received a message from a particular app at a particular time. For governments, that metadata can be more valuable than message content.
MIP-05 accepts that Apple and Google's push services are unavoidable on mobile devices but removes the need to trust the notification server with anything meaningful. The mechanism is elegant: your device token (the identifier Apple or Google uses to reach your phone) is encrypted with the notification server's public key using an ephemeral keypair generated specifically for that encryption. The server can decrypt the token and forward the notification, but it cannot link the encrypted token to your Nostr identity or correlate tokens across groups to determine which ones belong to the same user.
Payload padding ensures that all encrypted tokens are exactly 280 bytes regardless of platform, preventing group members from inferring whether someone uses iOS or Android based on token size. Decoy tokens from other groups are mixed in with real ones when triggering notifications, obscuring group sizes and preventing the server from building social graphs by observing which tokens are bundled together”
🔥🔥
naddr1qqgx...