If we could at least offer a path to publish Kind 01 notes publicly, without revealing someone's IP address, at least as a fallback option.

Reply to this note

Please Login to reply.

Discussion

Revealing IPs to whom?

Relays, I suppose.

Web clients are harder, but users could avoid them.

Isn't this still the age old issue of hiding IPs from all servers? You have to reveal an IP to someone unless youre using tor or VPN etc

nostr:note16xyrhk8rcsfe6gymm6lxzwe7z0kwws8gq8ygvndxl0293ku20jsspeh00m

How is this any better than TOR? Genuine question? Maybe I should look into this deeper, but the idea onion routing solved was an better way to obfuscate traffic, to break packet and timing coordination.

I have no idea. I don't even really understand tor or VPNs.

That's why I'm asking you guys about it. 🤷‍♀️

OHTTP uses pre-defined routes and doesn’t have its own separate consensus mechanism so it’s far far simpler than Tor

The problem I see with tor (and VPN) is that it requires the end user to implement it. I'm looking for something that is maybe not quite as secure, but therefore baked into the core functionality.

Privacy for dummies.

That’s exactly what OHTTP lets you do. Clients can bake in that they only connect to relays over OHTTP and relays can be unreachable without it. And it doesn’t take 30s to start like Tor.

it's hard to protect people who can't lock a door

Even with a VPN, you are revealing your IP to your VPN provider.

So, you post to their relays they propagate your notes out from there?

Yes.

That's why I find it frustrating that some clients have relays hardcoded. I'm forced to write to relays.

Even with tor your revealing your IP to an entry node. Correct, the cycle does not end. No one can send you mail without knowing your home address. You could argue post office boxes, but that requires physical isolation, in that case find a place with free wifi to connect to I suppose.

Best bet so far is to run your own relay and strip the forwarding data.

I suppose to include here, you are often nost just trusting the relay hoster, but often CloudFlare for observing your plaintext traffic, IPs, and so on, or whatever datacenter/hosting provider the relay owner is using as well. I can't imagine most relay owners are hosting their relays from their home networks.

These are often American or European companies, and therefore less likely to be a threat to me, personally, than individual nutjobs.

Pick your poison.

I think mobile internet NAT stands the best scrutiny here. Probably a majority of users anyway.