“Network relays are built on the modern and standardized MASQUE protocols and can be used to proxy all TCP and UDP traffic” Holy shit! It’s not just web requests. This is way better than your standard VPN. It also obfuscates traffic through http so it’s harder to tell that you’re even using it. TIL @Obscura VPN also uses this. This is the way we can make nostr network traffic private without requiring people to run VPNs. View quoted note →

Replies (25)

It’s a protocol, we can set up our own MASQUE relays and use them within the app. I’m not sure if you can use apple’s. If you can it makes sense to use that for users who have an iCloud subscription . @npub1t0ny...jgqv says you might not be able to. cc @Dan Gould
Apple controls both the OS and the proxy. They can access the decryption key whenever they want. In a perfect world the OS would be open source and verifiable. There’s no competitive reason to keep the OS closed source. Keeping it closed just ensures that state hackers have more attack vectors. Probably just worried about public researchers seeing the number of bugs in it.
The difficulty with proxying arbitrary traffic like Apple does is that an attacker can flood DoS traffic behind protection. That’s why OHTTP specs 1:1 relay server to gateway server. OHTTP could even work for general Nostr if it were available over WebTransport instead of WebSocket.
Interesting, gonna chat with carl, curious why they need that. Maybe if they control both the masque nodes
This is not what the apple docs says, and its not what I have been reading. From apple docs: “Network relays are built on the modern and standardized MASQUE protocols and can be used to proxy all TCP and UDP traffic”