David @mleku - 20h
keep in mind that IP address is going to be trackable, so probably a per-session key is sufficient for this. the user would need to take care of their origin IP identity problem using tor. but also, if they really want to go to town, a per-request would be better, as tor typically can be easily triggered to make a new exit on demand so the more fake pubkeys the merrier.
generating new private keys is cheap, and the signature operation doesn't get slower just because you do it with a different secret. session-wise, also this is baked into the websocket protocol situation and multiple tor users may appear to interact with the relay from the same exit node. so, this is fine, maybe one other small point on the anon stuff is to have a shorter lifespan for socket sessions if the user wants anon
Laeserin @Laeserin - 17h
We were originally going to just log them into a newly-generated key, when they go to post something.