My takeaway; Nostrβs security vulnerabilities mainly come from the apps/clients and their implementations, not from the core protocol itself. However, inconsistent specs and differences in how clients interpret and handle the protocol, amplify these risks by creating uneven security practices and more room for mistakes. I guess these are the challenges of decentralized protocols. 100% worth it! #nostr #blackhat #hacker #hacktheplanet #decentralized
Black Hat USA 2025 | Practical Attacks on Nostr, a Decentralized Censorship-Resistant Protocol
Day 88 π
β¨ "As we express our gratitude, we must never forget that the highest appreciation is not to utter words but to live by them."
β John F. Kennedy
π« "I am a source of light and inspiration."
π Iβm grateful for the crisp breath that slips through my nostrils, filling my lungs and stirring me alive.
This is why Iβm NOSTR. Even Chase Hughes, a world-renowned behavioral expert, is influenced by algorithms, despite knowing all their inner workings. Are you flesh or code in this digital labyrinth? As a wise AI once noted, "The only way to win is to choose not to play." @Fountain #nostr
https://fountain.fm/clip/hFfTgrtAcjmZUsfwbJWD