Why over nostr though? Pls explain.

Id still have the same disagreement with TCP over nostr... You still need dns, websockets, http, tcp, ip, just to tunnel your DNS. Then just deffer trust to the resolver. I could set up a resolver with DoH right now and sell it, but few would buy it. People still have trust for things like cloudflare or quad9 over a pleb they don't know running a device that can spy on everything they were doing regardless of how open it is.

Reply to this note

Please Login to reply.

Discussion

true, but paid nostr relays are low friction. if you used a noise or blocking lookup, the client could request "dns records with this hash prefix" and accept the spam, hiding their intent. similar to have i been pwned

the relay could also be proactive - bundling dns records when events include hosts

I see what your going for. I think the client should be the one hiding stuff from the relay though, generating the noise. This also sounds like it assumes the client-relay connection is being spied on. Because I'm assuming the "relay" is using a private, recursive resolver, and therefore can't really generate noise, and would be unnecessary I think.

if the prefix gets you what you want, then the relay has no idea what you were looking for. if not, then you can use client generated noise to hide your actual query