Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 17
Generated: 13:52:23
Nostr apps should be served over Nostr, independently of DNS, CAs and host servers. Nostr app env can provide key management, relay connections and event storage without every app having to duplicate. Ideally, this would happen on the browser or even OS level. nostr:note1205kts0atv8zs275as3hn6ejlscgdlzng63x0pyq8x8c2mry38jqql69j8
2025-11-13 15:52:02 from 1 relay(s) 10 replies ↓
Login to reply

Replies (17)

CC nostr:nprofile1qqsthdwa5rs42euhnuz5xsrmmssr84hshwes7uj392vpeldj7z0zw3cppemhxue69uhkummn9ekx7mp0qyghwumn8ghj7mn0wd68ytnhd9hx2tcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhscs6htm et al
2025-11-13 16:41:24 from 1 relay(s) ↑ Parent Reply
https://git.nostrdev.com/mleku/next.orly.dev/src/branch/main/docs/names.md this is a novel consensus protocol that uses nostr relays for storage and rendezvous connections, to process name registrations (as in DNS names) and registration updates (mainly assigning them to new npubs). just for the fuck of it i threw in a TLS replacement that uses nostr cryptography and the noise protocol instead of AES256 CBC/CFB types of encryption used in SSL, it's going to be using sha256, probably chacha20poly1305 as the cipher stream (although, to be fair, AES-NI is faster on most hardware if the compiler supports using it) CSPRNG, because hey, we can integrate ACME challenges into the protocol, so relays can verify bindings between a name and an IP address. the consensus is based on one designed by lesterpig, the inventor of the "sporeDB" database replication protocol, which more recently he refined and upgraded to become "PnyxDB" named after the forum in Athens where democracy first happened. it works by relay operators specifying their trust ranking of other relays that they do, or do not, particularly, want to replicate their version of the database, and based on the user assigned trust scores, and the trust scores assigned by those users towards other candidate new trtansactions, and it accepts them if they pass 50% trust and ignore them if they don't. this creates what i'm going to refer to as a "lumpy consensus" that is fairly consistent between nodes but different enough that because it's fully peer-driven, subjective evaluations, the only attack on this consensus is a social one, so, there is no central lever in the consensus, it's less than 100% consistent, maybe it varies from 75-99% agreement on the consist of the database, but because to coordinate an attack on the consensus one has to recruit more than 50% of the relay operator population in order to beat the un-manipulated choices of the remainder, creates a lot of friction for attempts to compromise it. this proposal completely covers every aspect, even ones you hadn't considered, such as the integration of acme challenges for verifying the server is controlled by someone who also controls the nsec of the registration. because it's a p2p network, the reason for integrating the connection encryption with it is that you can basically turn the network into letsencrypt, without the single point of failure. so there can't be a monopoly market in third party attestations, either, because the cost for robust attestations is trivial. putting this at the OS level is just augmenting the DNS client in most OSs with a nostr client that reads and caches relevant data from the consensus, same way as a BIND9 client does. because the actual database is stored in a nostr relay, the name service client doesn't have to cache anything, it can just pick any random replica to query for name resolution requests. but you can also run a replica yourself, and always have an up to date database of all the registered names and never wait for the network to know where to connect. i intend to build this thing in the near future. and i think that this, whether what i make catches on, or an improved version, is going to be 100% a thing on nostr within the next 12 months. we are going to most resolutely get the attention of the cabal rolling this technology out, though they aren't gonna figure it out until after it's already in the wild. there may be small details and maybe my design isn't quite right to do the job fully yet but it's a likely good starting point, and once it exists, nostr can fully detach from the IANA namespace. so, please do read, and criticise the shit out of it, make counter-proposals and whatever else. the sooner we can detach from the DNS and TLS cabals the better. DNS is the main vulnerability in nostr right now. it depends heavily on it. if it could move that dependency INSIDE nostr that would be a phenomenal defense against compromise of the desirable properties of the protocol.
2025-11-13 21:16:45 from 1 relay(s) ↑ Parent Reply
Been doing this for years. Welcome to the future! Follow the work of @alex@gleasonator-com.mostr.pub and you're 90% of the way there.
2025-11-13 21:29:13 from 1 relay(s) ↑ Parent Reply
Agreed, probably a natively running nsite resolver will help. You can't really trust the gateways to serve legitimate content + the gateway effectively MITM's your signer. DNS for the primitives like relays /blossom will be around for a while. NoDns can help mitigate DNS risks. Then the main (rugpull) risk left are ip addresses
2025-11-14 00:00:39 from 1 relay(s) ↑ Parent Reply
It wouldn't work. You in theory ditch secp256k and start over with Crystals or similar (hello 2.5kb signatures). But on Nostr it makes no sense to hard fork and just change the key type, since there are other unresolved technical problems, you'd want to kill as many birds with one stone as you can. It'd basically be an entirely new protocol. This one written off. The problem is that it has to be done. I mean it would be quite a feat of engineering if within 3 years there was a quantum computer that can crack secp256k via shor's, in the 2k-6k logical qbit range. But the thing is it's entirely possible, given how AI is supercharging error correction and new advances in qbit types and noise reduction. So if being serious about security you have to assume it will happen in 5 years, and you definitely have to assume it will happen in 10. Signal started their fix a couple years ago and are basically done, so things like White Noise can be reworked to remove nostr (as we know it now) as the transport layer. But for nostr itself there is zero scope for migration, it's the end of the line.
2025-11-14 04:01:28 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
First, because it’s not a migration in the Bitcoin core sense, or the Signal sense, etc. In nostr the vulnerable key is the absolute end of the line, last station on the subway. Second because a hard fork requires consensus and there is no way to achieve consensus here on something like “just” swapping out the keys, that would require consensus on everything about the hard fork from everyone who is to be a lead participant in it, and in a highly organic and unstructured way, which is the only way nostr has. Which, if you think about it, means starting again from scratch.
2025-11-14 07:13:07 from 1 relay(s) ↑ Parent 1 replies ↓ Reply
Well yeah, that's also an issue. It's also possible that shor's is realized sooner than we're predicting, and announced suddenly, so before Bitcoin can propagate whatever is selected in the end, and that is the end of Bitcoin more or less, not just nostr. (There is currently a race condition between bitcoin core and a quantum machine that can realise shor's.) I'm optimistic that a Nostr 2.0 will come out and be much better than this one, but a complete from-scratch do-over. I'm not optimistic that Nostr 1.0 can be "patched" by just swapping out keys. Every dev here has a sacred list of hard-fork-requiring things that, if there is going to be a hard fork for quantum or whatever else, then those things MUST also be in the hard fork. In other words the next fork might be the only hard fork to ever occurs and those hard-fork requiring things will just have to be in it, now or never.
2025-11-14 07:47:07 from 1 relay(s) ↑ Parent Reply
This would be great indeed. The web though has these benefits: 1) reach; 2) no need to beg for a slot at play/app store. It's important to have a bridge between such napp launcher and web-based ones.
2025-11-14 14:24:52 from 1 relay(s) ↑ Parent Reply