#relay
10 items · 10 articles
Articles
Algorithms as Identities: Why NIP-85 Matters
NIP-85 makes each algorithm a Nostr identity. Users follow algorithm-keys, see their outputs, and switch freely.
The Praxeology of Privacy ~ Chapter 17: Decentralized Social Infrastructure
Nostr solves identity capture through cryptographic keys users control. Relays compete, moderation is market-driven, and the protocol extends beyond social posts.
Own Your Outbox: Running Haven as Your Personal Nostr Relay
Your relay, your rules. Haven bundles four relay functions into one binary, easily deployable on a cheap VPS in an afternoon.
The Trust Shift: Secure Enclaves for Private Nostr Relays
TEE relays shift trust from operators to chip manufacturers. For most threats, that trade is worth making, with eyes open.
The Gap Between PIR and Nostr: Open Problems in Private Relay Queries
Can PIR hide Nostr queries from relays? Compound filters and subscriptions don't map to existing schemes. Here are the open problems.
The Case for Custodial Nostr: Why Teams Should Stop Fighting the Lost War
Organizations already delegate key custody internally. A server-side Nostr client with permission management would be faster, stabler, and more honest than relay-dependent remote signing hacks.
The Protocol Rothbard Would Have Built
Nostr implements Rothbard's anarcho-capitalist vision: cryptographic property rights, voluntary relay markets, and censorship-resistant communication without state-corporate gatekeepers.
Proving You Belong Without Saying Who You Are
Zero-knowledge proofs let Nostr users prove they're trusted without revealing their identity, enabling anonymous rate-limiting and reputation-gated relay access.
Curated Feeds: A Simpler Alternative to DVM Feeds
Replace DVM request/response overhead with simple replaceable events. Publishers maintain feed lists, clients just subscribe. No round trips, no privacy leakage
Private Relay Connections: Zero-Knowledge Solutions for Nostr
Nostr relays see everything - who connects, what they fetch, how often they post. Zero-knowledge cryptography can fix all three problems: Semaphore-based authentication hides which whitelisted user is connecting, private information retrieval hides which notes you're fetching, and Privacy Pass enables rate limiting without identity linkage.