Not necessarily. Someone could choose to just run their own relay and restrict access to it for example.
Login to reply
Replies (2)
Letβs say you post your original note to the Damus relay. This other relay could crawl it and backup a copy before you mark it for deletion.
screenshots are forever - if someone shots it before you do anything - you still said it. and public keys are traceable eve if they are abandoned. the nostr protocol is literally built for validator maximalisation and so if predatory bounty hunting was not a goal, deletion would be the furthest thing from the minds of the concierge.