Articles

Verify Anyone on Any Channel

Verify Anyone on Any Channel

A simple challenge-response app can verify Nostr identities across any anonymous channel by querying the follow graph users already built.

The Algebra of Trust

The Algebra of Trust

Anonymous commerce requires solving the trust problem, and the solution may be to treat trust itself as a quantifiable, tradeable commodity.

Algorithms as Identities: Why NIP-85 Matters

Algorithms as Identities: Why NIP-85 Matters

NIP-85 makes each algorithm a Nostr identity. Users follow algorithm-keys, see their outputs, and switch freely.

Trust Without Ceremonies: How Nostr Fixed the Web of Trust

Trust Without Ceremonies: How Nostr Fixed the Web of Trust

PGP's web of trust failed because it demanded explicit rituals. Nostr succeeds by extracting trust from ordinary social behavior.

Own Your Outbox: Running Haven as Your Personal Nostr Relay

Own Your Outbox: Running Haven as Your Personal Nostr Relay

Your relay, your rules. Haven bundles four relay functions into one binary, easily deployable on a cheap VPS in an afternoon.

Proving You Belong Without Saying Who You Are

Proving You Belong Without Saying Who You Are

Zero-knowledge proofs let Nostr users prove they're trusted without revealing their identity, enabling anonymous rate-limiting and reputation-gated relay access.

Owned by No One: Solving Nostr's Key Rotation Problem

Owned by No One: Solving Nostr's Key Rotation Problem

Nostr's greatest strength - that you own your identity through cryptographic keys - becomes its greatest weakness when keys are lost or stolen. This post introduces two simple, social solutions that let users mark compromised keys and rotate to new ones through community verification, without complex cryptography or pre-planning.