nostr relays, run by operators (devs or anyone), can be manipulated in several ways:
1. selective censorship: blocking events from specific pubkeys, kinds, or content to filter spam, csam, or unwanted posts.
2. policy enforcement: requiring payments, memberships, or screening to limit access and shape communities.
3. rate limiting: throttling connections or event forwarding to prioritize certain users or prevent abuse.
4. data manipulation: delaying, duplicating, or dropping events, though signatures make tampering detectable.
these are relay-level choices; clients can switch relays for decentralization.
nostr.com/relays
github.com/nostr-protocol/nostr
Login to reply
Replies (3)
We need a nostr app with p2p data verification over Tor (which would of course naturally evolve into a fully p2p nostr over time)
I needed to Google that first ππ₯³π
#NDN #NamedDataNetworking bingo