FAQ
what this button do?
Is slowly updating!
Here you'll find questions categorized by colors you might have about what is what. I'll add more content slowly as I get more questions.
Show All Questions
Universal Questions
Questions about Client
Questions about URL Maker
Questions about the Home Site
Questions about ShowHistory
If you have any questions, please feel free to ask! I'll do my best to include them asap.
FAQ (Frequently Asked Questions)
It's me, StellarStoic! Unknown to the world because I always keep my distance from it. But you can find me on the protocols like Nostr and ...Nostr
If you find something you believe is illegal, disturbing, or malicious, you can report the URL by emailing to report@snofl.com. Please provide as many details as possible about the URL in question in your email. I will do everything within my power to make the URL inaccessible if it is found to violate our policies.
The "Your Content" section is where you present your content to the end user. You can type freely and structure it as you like.
You can embed Nostr notes and npub profiles by adding a prefix:
nostr:note1t9wfaksdutq0hlnvqpzud5cq4wm9574mey0ykg3ju65stgezvsds56fg9z
nostr:npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
note1...
format is supported—sorry!
You can also include links to images or videos to display them in your custom page. Both Vimeo and YouTube links are supported and will generate thumbnails.
QR codes can be embedded using the
qr:
prefix, such as qr:somethingSomething
. Some QR codes can include logos, which are used with specific prefixes:
bitcoin:
lightning:
ecash:
monero:
Links starting with
https://
will be formatted to open on click.
Note: Script tags are not supported in this section. If you attempt to post code, the URL will be invalid for the end user. If you must share code, take a screenshot and upload it as an image link instead.
The ShowHistory section contains all the Nostr events you have posted.
If you have created and used multiple Nostr IDs, each ID will have a different **color** to distinguish them. Each ID is given a **randomly generated name**, which consists of:
- A random adjective
- A random noun
- A random number from 01 to 21
In the ShowHistory section, you will see a **number** in front of each name, which represents the **total number of notes** you have posted with that specific ID.
The details also include:
- Your **private key** (masked with
*****
for security). Click to reveal it. - A **QR code** on the other side, which allows you to easily import the ID into any Nostr client.
- Basic **Nostr event details** (following Kind 1 Nostr Events specifications).
I am aware of the security risks associated with storing private keys in plain sight, but these are disposable IDs, and you should treat them as such.
Extra Features:
- A large **Download** button at the top to export your full history in JSON format.
- A **Delete All (Panic Button)** at the bottom if you want to erase everything quickly.
When you post a response (a note), you receive feedback containing the event details. The note has been broadcasted to Nostr relays and is now part of Nostr forever.
You have several options to search for your note:
- Use the search client to look up similar content.
- Copy the event ID in the event details and search for it manually.
- Visit njump.me using the buttons below the event details.
- Copy the event ID with a button bellow the event details and search for it manually.
If you lost track of your posted note details, don't worry. All your posted notes are stored in the ShowHistory section, located in the footer below.
Yes, you can use the search client to look up content on Nostr relays that support
NIP-50.
You can search using multiple keywords, either combined or separately.
You can toggle the view by keyword, or even block publishers you don't like.
It's still a work in progress, so some features may not work as expected.
Reactions don’t work yet, and things are still a bit clunky because, honestly, I suck at understanding WebSockets. 😅
NTAG memory has been set with a careful reading of the NXP documentation papers
NTAG Memory Comparison
NTAG Type | Total Memory | User Memory | Max NDEF (Writable Data) | Max Text (Char.) | Max URL (Char.) | Use Case |
---|---|---|---|---|---|---|
NTAG 203 | 168 bytes | 144 bytes | ~137 bytes | 137 | 135 | Short URLs, automation |
NTAG 213 | 180 bytes | 144 bytes | ~137 bytes | 137 | 135 | Basic vCards, small automation |
NTAG 215 | 540 bytes | 504 bytes | ~492 bytes | 492 | 490 | Amiibo, longer vCards |
NTAG 216 | 924 bytes | 888 bytes | ~868 bytes | 868 | 866 | Large records, WiFi configs |
NTAG 413 DNA | 416 bytes | 404 bytes | ~398 bytes | 398 | 396 | Secure URLs, anti-counterfeit |
NTAG 424 DNA | 928 bytes | 916 bytes | ~888 bytes | 888 | 886 | Secure vCards, payments |
The current font used on this website is loading....
You don't like the loading... font? Not a biggie! Click here to choose a new random one.
The security of the URL encryption on this platform relies on AES (Advanced Encryption Standard), specifically AES-256. This encryption standard is widely recognized as one of the most secure methods available today and is used globally to protect sensitive data, including government and financial information.
🔐 What Makes AES-256 Strong?
- Key Length: AES-256 uses a 256-bit encryption key, offering 2256 possible combinations. This is a number so large that even modern supercomputers would take billions of years to brute-force it.
- Cryptographic Strength: AES is a symmetric encryption algorithm, meaning the same key is used for encryption and decryption. This simplicity ensures high speed without compromising security.
Examples of Password Strength and Brute-Forcing
Password Length/Type | Time to Crack (Brute Force) |
---|---|
Weak (e.g., "12345") | Instantly |
Moderate (e.g., "P@ssw0rd") | A few hours with modern hardware |
Strong (e.g., "F&2zL!8x9wXy@#Tp") | Over 1 trillion years |
Best Practices for Maximum Security
- Choose a password with a minimum of 12 characters, including uppercase, lowercase, numbers, and special symbols.
- Avoid common words, predictable phrases, or keyboard patterns.
- Store passwords in a secure password manager instead of relying on memory.
A Brief History of AES
AES was established as the encryption standard by the U.S. National Institute of Standards and Technology (NIST) in 2001. It replaced the older DES (Data Encryption Standard) due to advancements in computing power that made DES vulnerable. AES was selected through a global competition and is based on the Rijndael cipher, designed by cryptographers Joan Daemen and Vincent Rijmen.
Why Privacy Matters
Protecting sensitive information like URLs ensures that your personal data and activity remain private. Encryption plays a crucial role in safeguarding secure links and confidential content, providing peace of mind that unauthorized access is nearly impossible. However, centralized institutions have a poor reputation for securely storing personal data, highlighting the need for individuals to take control of their privacy. While encryption is a powerful tool, it’s only as strong as its weakest link—humans. Mistakes, phishing, and social engineering can compromise even the most robust security systems. Empowering users with knowledge and awareness is just as important as using strong encryption.
Always remember: The strength of encryption depends on the strength of your password, your opsec and people you share this password with!
You can't