Damus
rabble profile picture
rabble
@rabble
If we want Nostr to truly protect privacy and resist censorship—like when X faced a government ban—we need to stop relying on relays with known IPs or domain names.

We need encrypted traffic between clients and servers by default. That means Tor (and networks like I2P and Nym) should just work right out of the box, ideally without leaving the mixnet where traffic could be exposed at the exit node.

💡 A lot of relay operators are already running Tor onion services, which is awesome—but we need to make them easier to discover and use. If a public relay becomes unavailable, we should be able to switch to the Onion service version seamlessly.

What do we need to do to make this happen? First, it’s about getting Nostr relay software to publish the Onion address when it’s set up. Then, it’s about getting clients to handle alternative transports like Tor or I2P natively, letting users choose between IP (TCP/IP), Tor, or other options.

We could also explore mapping DNS records to onion addresses or including the info in HTTP headers. But maybe the most straightforward approach is extending NIP-11 to include alternate transport details so that everything's baked into the protocol.

What do you all think? How can we push this forward? Let’s brainstorm and figure out the best way to support these privacy-preserving networks and keep Nostr resilient. I think we need Tor support in native clients where users can turn it on with a single click. Or maybe even have it attempt Tor as a fallback when the normal way of connecting fails.

This isn’t a big change current relay info ospec here: NIP-11 https://github.com/nostr-protocol/nips/blob/master/11.md

4049❤️71🤙34🔥4🚀4❤️3💯3
Liberty Farmer · 81w
I don't disagree at all. The tor issue is its just so slow. There is no quality of service there at all. Reticulum network is intriguing with the built in encryption, route finding, addresses, etc... Ideas like that seem like a good idea. Or similar to bitcoin core, self discovery and propogation ...
SwBratcher · 81w
Good call, @Rabble. I run a nostr:npub126ntw5mnermmj0znhjhgdk8lh2af72sm8qfzq48umdlnhaj9kuns3le9ll and their built in marketplace’s #Nostr #relay application with a private relay set up. I’ve whitelisted my npub for my app usage to allow writing to it. But, I can’t seem to use it. I use @...
ZenMeme · 81w
It's all about the Relays and then "concepts" about relays so newbies like myself can GROK them and help create narratives for others to "get it" and adopt #Nostr
JD · 81w
Going a level up, it's as if the internet its self could be reimagined. It's a network of private networks controlling and managing access and routing. Imagine if it wasn't. Community built networks running a shared broadband and providing access to all. Everyone hooking up to it on thie own. Lik...
nostrich · 81w
Fuck twitter dude.
gsovereignty · 81w
Identify relays by pubkey, map that to an address. Integrate with NIP66 (cc nostr:npub1uac67zc9er54ln0kl6e4qp2y6ta3enfcg7ywnayshvlw9r5w6ehsqq99rx) Use relay's pubkey to encrypt requests. Subscriptions can be encrypted to the pubkey making the request.
nymble · 81w
The best solution I can see for practically everything you mention is Namecoin/BitDNS for Nostr names (xxxxx.bit). The protocol is under-utilitized but this is a blessing since it reduces the load clients and relays need to run. If clients packaged a light node with their offering and relays ran ful...
It's Moro! · 81w
i agree with if the protocol could go looking for known alternative routes to a relay if first one is blocked. smart and in amethyst i couod see that being very easy with their orbot integration for example. user can run client over orbot, and they put say relay.damus.io as a relay, but they wont kn...
Laan Tungir · 81w
Each relay having an npub seems like an obvious start.
Libretech Systems - DARKLEAF · 81w
nostr:npub1wmr34t36fy03m8hvgl96zl3znndyzyaqhwmwdtshwmtkg03fetaqhjg240 relays should be behind lokinet
Pak · 81w
If current nostr got as big as Twitter in Brazil, would it be able to make nostr unusable? What would their government have to do differently against nostr vs Twitter?
vinney...axkl · 81w
I'm more partial to peer to peer without tor. If I know the IP (or domain...) of just ONE "gateway" that helps me with discovery of peers and other gateways I care about, I can hop out from there. Plus this de-globalizes DNS: *this* gateway has abc.com registered at IP 1234 while *that* gateway has...
DM for new npub · 81w
To me it sounds like the relays need a verifiable identity! Users who currently find their relays via DNS and talk to them over cleaner TCP-IP need a way to identify their relays in a post DNS environment. How about we create an NPUB for each relay and that NPUB publishes a note with its Tor addre...
Lady Mae - Growth Teacher · 81w
I get the part we need privacy by default. my only question how do we mitigate that using tor can be slow 🤔
Logen Kain · 80w
At that point, couldn't we use a distributed p2p-like nostr specific dns? There would have to be some sort of trust mechanism, but dns is already an open concept. Each node could be it's own dns server. If one node is comprimised, the others reject it. We just need to figure out how to prevent th...
Barry Allen · 80w
For people don't even notice any slow, clients can display videos and images without Tor. That way the only thing that exposes are the file servers
sandwich · 80w
NIP-66.