Simple Tools for Interacting with the Nostr Protocol

If you haven’t had a chance to ready my previous post about nostr, it is probably worth checking out as it give a detailed, step by step explanation. https://nessy.info/post/2023-02-16-deciphering-nostr-and-its-private-keys/ With knowledge gained from the previous post I decided to put together a couple of rough python scripts, this is to handle a few of our previously manual steps. Head on over to my Github and check out my nostr_stuff repository:

Deciphering Nostr and it's private keys

I’ve heard of https://nostr.com for about a year, but not until recently have I experimenting with it. This post consists of my rough notes as I progressed to sending a nostr message. If you are interested in a bare minimum way to post events to nostr, read on. Generate a new private key $ openssl ecparam -name secp256k1 -genkey -out ec-priv.pem The output here as the file extension notes is PEM:

Check SSL certificate's expiration

If you ever want to quickly check the expiration date on your HTTPS server’s SSL certificate all you need is OpenSSL , luckily most of your Linux and OSX workstations will already have it installed. openssl s_client -showcerts -connect **domain.com**:443 </dev/null 2>/dev/null \ | openssl x509 -noout -dates You should get back a nice and tidy response with a notBefore and a notAfter date: notBefore=Mar 13 00:00:00 2015 GMT notAfter=Mar 12 23:59:59 2018 GMT