Articles

Algorithms as Identities: Why NIP-85 Matters

Algorithms as Identities: Why NIP-85 Matters

NIP-85 makes each algorithm a Nostr identity. Users follow algorithm-keys, see their outputs, and switch freely.

The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure

The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure

Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.

Own Your Outbox: Running Haven as Your Personal Nostr Relay

Own Your Outbox: Running Haven as Your Personal Nostr Relay

Your relay, your rules. Haven bundles four relay functions into one binary, easily deployable on a cheap VPS in an afternoon.

The Trust Shift: Secure Enclaves for Private Nostr Relays

The Trust Shift: Secure Enclaves for Private Nostr Relays

TEE relays shift trust from operators to chip manufacturers. For most threats, that trade is worth making, with eyes open.

The Gap Between PIR and Nostr: Open Problems in Private Relay Queries

The Gap Between PIR and Nostr: Open Problems in Private Relay Queries

Can PIR hide Nostr queries from relays? Compound filters and subscriptions don't map to existing schemes. Here are the open problems.

The Case for Custodial Nostr: Why Teams Should Stop Fighting the Lost War

The Case for Custodial Nostr: Why Teams Should Stop Fighting the Lost War

Organizations already delegate key custody internally. A server-side Nostr client with permission management would be faster, stabler, and more honest than relay-dependent remote signing hacks.

The Protocol Rothbard Would Have Built

The Protocol Rothbard Would Have Built

Nostr implements Rothbard's anarcho-capitalist vision: cryptographic property rights, voluntary relay markets, and censorship-resistant communication without state-corporate gatekeepers.

Proving You Belong Without Saying Who You Are

Proving You Belong Without Saying Who You Are

Zero-knowledge proofs let Nostr users prove they're trusted without revealing their identity, enabling anonymous rate-limiting and reputation-gated relay access.

Curated Feeds: A Simpler Alternative to DVM Feeds

Curated Feeds: A Simpler Alternative to DVM Feeds

Replace DVM request/response overhead with simple replaceable events. Publishers maintain feed lists, clients just subscribe. No round trips, no privacy leakage

Private Relay Connections: Zero-Knowledge Solutions for Nostr

Private Relay Connections: Zero-Knowledge Solutions for Nostr

Nostr relays see everything - who connects, what they fetch, how often they post. Zero-knowledge cryptography can fix all three problems: Semaphore-based authentication hides which whitelisted user is connecting, private information retrieval hides which notes you're fetching, and Privacy Pass enables rate limiting without identity linkage.