V E C T O R's avatar
V E C T O R
npub1hruj...f3yh
◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢ ⚠️ Privacy is a basic human right. ◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢ • Private & Encrypted Messenger App • Open-Source & Free-to-Use • Built on Nostr ◤◢ Privacy by Principle ◤◢ Vector is a decentralized communication platform built on the Nostr Protocol, offering no-compromise encryption with zero metadata leakage and plausible deniability for all content, including texts, media, voice notes, and files, adhering to the NIP-17 standard. It natively integrates BIP-39, allowing every Vector account to function as a crypto wallet and vice versa, streamlining tasks like address sharing and payments through compatibility with native wallets like MPW. Vector leverages local, private, device-powered AI to provide practical features such as voice message transcription, language translation, and meme gif search via a decentralized relay-based index. Its resilience is ensured by community-run Nostr re
V E C T O R's avatar
VectorPrivacy 3 months ago
"My North Star on the topic remains that all humans flourish under the protection of privacy; it creates a space for reflection and action which invariably leads to stronger personal conviction and the development of true identity. That's what guides us, internally and alongside others, not the piece of plastic a government tosses at us." —nprofile1qqsv7xnxmvek9q98l86qckdrnal6jmpsj3t2xxnu2038j5lrgcqsm5gu2ge59 image
V E C T O R's avatar
VectorPrivacy 3 months ago
Always a good day to revisit A Cypherpunk's Manifesto "Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world. If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to. Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself. Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy. Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature. We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor. We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do. We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money. Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down. Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible. For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals. The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace. Onward." Eric Hughes March 9, 1993 image
V E C T O R's avatar
VectorPrivacy 3 months ago
Remember, remember the 5th of November... Vector Open Beta (v0.2.1) Release >> 1 Click Login with Nostr We are happy to announce our official release of Vector Open Beta that now supports fully end-to-end encrypted Group Chats. Nostr users can login with their `nsec` keys, as Vector is built on the decentralized relay network known as Nostr. Thanks to Nostr protocol and community for making this technology possible and publicly available. Vector is happy to share that it ascribes to the same open-source philosophy and aligning with like-minded people and communities. - Free, Open-Source - No KYC (No Email, Phone, oAuth, etc.) - No Data Collection - No Ads/Spam - Local Device Data Storage (P2P) - Decentralized Relay Network (Nostr) Official Website: Official GitHub: image
V E C T O R's avatar
VectorPrivacy 3 months ago
👁‍🗨Privacy Messengers ⚠️Not all "Privacy" apps were created equally There are degrees of privacy, as there are degrees of decentralization. Let's explore what exactly privacy is when it comes to messenger apps. Vector is honored to be building on the Nostr protocol and along with the Nostr community. Check out our research below and comparison of different privacy messenger apps. Special thanks to @JeffG with @White Noise for their development of Marmot protocol, which we have recently integrated as our Group Chat protocol for sleek, highly-secure, scalable groups and communities. If you want to show some love for Nostr-based apps, give us a share! image
V E C T O R's avatar
VectorPrivacy 4 months ago
◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢ Vector Beta available on GitHub! ◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢ ⚠️Privacy is a basic human right. ◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢◤◢ #Nostr community, enjoy a simple login with your Nostr Account (nsec) and treat yourself to the Vector experience. ◤◢ D O W N L O A D ◤◢ 【 v0.1.9 】 #OpenSource #E2E #Privacy image
V E C T O R's avatar
VectorPrivacy 4 months ago
This is precisely why Vector Privacy is built on #Nostr image "We never wanted any humans, any employees (to) have access to private messaging data." — Pavel Durov, Founder of Telegram
V E C T O R's avatar
VectorPrivacy 5 months ago
Vector Bot SDK has been released! The Vector Bot Library is a Rust-based library for creating and managing vector bots that can send and receive private messages using the Nostr protocol. This library provides a structured and modular approach to building bots with configurable metadata and client settings. Features: - Create vector bots with customizable metadata - Send and receive private messages - Handle notifications for gift wrap events - Configure proxy settings for .onion relays - Add and manage relays - Modular architecture for easy extension and maintenance Special thanks to Luke Larsen at PIVX Labs for this Vector ecosystem contribution! image
V E C T O R's avatar
VectorPrivacy 6 months ago
Good afternoon, Nostr. Among all of the turmoil in the world, stay positive. Be a beacon of hope for humanity. We leave you with this quote by Buckminster Fuller... "You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete."
V E C T O R's avatar
VectorPrivacy 6 months ago
◤◢◤◢◤◢◤◢◤◢ E R R O R ◤◢◤◢◤◢◤◢◤◢ ———————————————————————— █▒▒▒▒▒▒▒▒▒ Human Rights failed to load. ———————————————————————— >> Please download [vectorapp.io] and try again... ⚠️Privacy is a basic human right. image
V E C T O R's avatar
VectorPrivacy 6 months ago
"Just feels like freedom" - @npub1uvxh...ttjz image ◤◢◤◢◤◢◤◢◤◢ @V E C T O R ◤◢◤◢◤◢◤◢◤◢ We'd love to hear the community's feedback so far on #VectorBeta and what all you all like, don't like, what you'd like to see improved, new features (non-stop development), and more. Comment below and let us know!
V E C T O R's avatar
VectorPrivacy 7 months ago
◤◢◤◢◤◢◤◢ V E C T O R ◤◢◤◢◤◢◤◢ “No–Compromise Encryption” In an era where data breaches and privacy violations are rampant, the Vector Privacy app emerges as a vital tool to empower individuals to protect their personal information. With massive data leaks exposing billions of records—such as the 2024 breach of 2.9 billion records from National Public Data or the 16 billion credentials leak involving major platforms like Google and Facebook. Every day, citizens face unprecedented risks from identity theft, phishing, and surveillance by nefarious actors and this only grows worse with time. Vector Privacy addresses these threats with a user-centric approach to privacy and security, offering robust features to help users reclaim control over their digital lives. Proactive Privacy Protection Vector Privacy prioritizes user empowerment and freedom through accessible and open-source technology, aligning with Edward Snowden’s assertion that “privacy is not about something to hide. It’s about something to protect.” The app employs end-to-end encryption for data both in transit and at rest, addressing the gap highlighted in recent studies where only 10% of organizations encrypt at least 80% of their cloud-stored data. By encrypting user communications and stored information, Vector Privacy ensures that even if a breach occurs, intercepted data remains unreadable to unauthorized parties. Nostr Protocol & Encryption Vector utilizes Nostr Protocol and specifically the NIP-17 Standard, which enables secure and private direct messaging by using NIP-44 encryption and NIP-59 seals and gift wraps. This means that chat messages are sent as plain text tagged with the receiver’s public key and optional relay URLs, while enhancing privacy through sender verification, randomized timestamps, and kind 10050 events to specify preferred message-receiving relays, ensuring lightweight and secure communication. In layman’s terms, this means the message is encrypted from A to B, then put through an obfuscation layer to mask the metadata, and finally it goes through the last layer of the protocol which is called “gift wrapping”. Combating Data Leaks and Breaches Data leaks, often caused by human error or misconfigured systems like AWS S3 buckets, can expose sensitive information such as names, addresses, financial information, biometric data, and virtually everything there is to know about a person. Vector Privacy mitigates these risks by offering tools to minimize data exposure. Since sensitive information including chat logs are not stored on a centralized server, there is no single point of attack that can compromise the user’s data and privacy. The power solely relies in the hands of the user, taking secure and intelligent security measures to store their private key(s). Thwarting Nefarious Actors Nefarious actors exploit stolen credentials for phishing, account takeovers, and identity theft, as seen in the 2024 Snowflake attack affecting over half a billion Ticketmaster users. Vector Privacy counters these threats with multifactor authentication (MFA), which significantly reduces the risk of unauthorized access, even if passwords are compromised. Snowden’s warning that “under observation, we act less free” resonates here. By utilizing the Vector No-Compromise Encryption protocol, no third party can see or have access to a user’s files, unless their individual device is compromised. Even if a user’s device is compromised, Vector’s database is locally encrypted and completely unreadable unless unlocked, which requires the user’s pin code. User-Friendly Security for All Unlike complex cybersecurity solutions, Vector Privacy is designed for everyday users, not just tech experts. Its intuitive interface guides users through setting up secure communication channels and easily managing custom preferences and settings. By fostering awareness and providing actionable tools, the app aligns with Snowden’s call to “take privacy back,” empowering citizens to protect their digital identities without needing advanced technical knowledge. No longer do you have to compromise security for convenience. One of the biggest issues with high-level encryption is that your ordinary user has no understanding or technical knowledge to be able to setup a secure system and that is why Vector exists, to remove that barrier entry. A Step Toward Digital Freedom In a world where a single breach can expose billions of records, Vector Privacy stands out as a beacon of user empowerment and digital aegis of protection. By combining a decentralized network with peer-to-peer encryption, it directly addresses the privacy and security issues that threaten citizens daily. Vector Privacy helps ensure that this fundamental right is not just preserved but actively defended, giving users the tools to safeguard their data from leaks, breaches, and nefarious actors. For more technical details, check Vector Privacy’s official documentation at https://github.com/VectorPrivacy. 🔰Vector v0.1.7 - ᛒeta Invite Code: B4TZJAUV #VectorPrivacy #Vector #Nostr image
V E C T O R's avatar
VectorPrivacy 7 months ago
://VectorBeta.exe Installing... █████████▒░ image