Scoundrel's avatar
Scoundrel 3 months ago
I brought up the design of Tor as an analogy for the design of Nostr. It's irritating that you only considered how Tor can be used for Nostr rather than the general design of Tor itself, but I'd rather drop the topic than try to spell out the analogy better. You are right that if a Nostr user's privacy is compromised, that can be leveraged in order to censor their speech. It doesn't matter how many relays are willing to publish a person's notes if the person in question is being imprisoned and physically prevented from posting those notes. However there are many existing privacy technologies that can be applied here. The most robust protections focus on protecting the user rather than the relay. Why agonize over finding a relay owner who will resist torture to keep your IP address when you can just avoid giving them your IP address in the first place? Personally I use a VPN because it's easy and convenient, but there's no reason a person couldn't send notes to Nostr relays over Tor or I2P or from a burner phone in a remote field. If privacy is the issue then there are lots of options, but if the issue is finding a Nostr relay that you know for sure is trustworthy, then you have no options at all.

Replies (2)

Dumb analogy. Tor and Nostr relays differ significantly in design and operation. Tor relays route encrypted, transient traffic through circuits for anonymity, with no data storage. Nostr relays store and broadcast persistent, plaintext notes, acting like federated databases. Tor hides who communicates, nostr ensures what is shared survives.
Scoundrel's avatar
Scoundrel 3 months ago
Tor and Nostr have one fundamental trait in common: redundancy. Nothing else matters for my analogy. Any system making use redundancy is worse off when the user or designer of that system attempts to distil the available components to only the most robust and reliable. Reducing the number of components can never make the system harder to break, no matter how high quality and well selected the remaining components are. Trying to find and select only the best relays is a complete waste of time, just like trying to prevent people from running Tor nodes unless you are confident they aren't keeping logs. They are identical in the way that matters.