mirror of
https://github.com/nostr-protocol/nips.git
synced 2024-11-10 06:09:08 -05:00
minor adjustments 2
This commit is contained in:
parent
f91d82425b
commit
1f123fe12e
12
22.md
12
22.md
|
@ -45,21 +45,17 @@ Relays and Clients MUST reject Event Deletion ([NIP-09](09.md)) requests of `kin
|
||||||
|
|
||||||
Clients SHOULD use Generic Repost (`kind:16`) with a stringified version of the `kind:18` and a `k` tag to `18` to let users warn followers and guarantee `kind:18`'s retention as much as possible.
|
Clients SHOULD use Generic Repost (`kind:16`) with a stringified version of the `kind:18` and a `k` tag to `18` to let users warn followers and guarantee `kind:18`'s retention as much as possible.
|
||||||
|
|
||||||
Generic Re-posts events simply warn followers and MUST NOT be considered the user's final decision on which key to switch to. Contact lists are the only source of verification.
|
Generic Re-posts events simply warn followers and MUST NOT be considered the user's final decision on which key to switch to. Contact lists are the only source of confirmation.
|
||||||
|
|
||||||
## Client Behavior
|
## Client Behavior
|
||||||
|
|
||||||
Upon receiving a new `kind:18`, Clients MUST warn their user the pubkey is unsafe.
|
Upon receiving a new `kind:18`, Clients MUST warn their user the pubkey is unsafe.
|
||||||
|
|
||||||
Clients SHOULD offer ways to investigate and verify if:
|
Clients MAY download follow lists of follows and display when a follow has switched to a new key.
|
||||||
1. the transition to a new key was intended by the owner OR
|
|
||||||
2. if this is an attack and the new key is controlled by an attacker.
|
|
||||||
|
|
||||||
Clients MAY download follow lists of the user's contact lists and display when a follow has switched to a new key.
|
It's ok to delay confirmation until trusted keys start informing their assessments.
|
||||||
|
|
||||||
It's ok to delay verification until trusted keys start informing their assessments.
|
Upon confirmation, Clients SHOULD offer transition to the new key by:
|
||||||
|
|
||||||
Upon verification, Clients SHOULD offer transition to the new key by:
|
|
||||||
1. Changing the contact list accordingly
|
1. Changing the contact list accordingly
|
||||||
2. Changing any NIP-51 list accordingly
|
2. Changing any NIP-51 list accordingly
|
||||||
3. Adding the old key to the Mute List
|
3. Adding the old key to the Mute List
|
||||||
|
|
Loading…
Reference in New Issue
Block a user