Everything Nostr is WebSockets now, tunneling is a bit more complex/slow, WebTransport is relatively new and not super widely supported
Discussion
Nostr is really just data, though. I don't think WebSockets need to be a fundamental part of the protocol.
Maybe it can grow to support all three of HTTP, WebSockets, and WebTransport.
Yes. Some portions are completely transactional which HTTP does perfectly.
If we could at least offer a path to publish Kind 01 notes publicly, without revealing someone's IP address, at least as a fallback option.
Revealing IPs to whom?
Relays, I suppose.
Web clients are harder, but users could avoid them.
Isn't this still the age old issue of hiding IPs from all servers? You have to reveal an IP to someone unless youre using tor or VPN etc
nostr:note16xyrhk8rcsfe6gymm6lxzwe7z0kwws8gq8ygvndxl0293ku20jsspeh00m
How is this any better than TOR? Genuine question? Maybe I should look into this deeper, but the idea onion routing solved was an better way to obfuscate traffic, to break packet and timing coordination.
I have no idea. I don't even really understand tor or VPNs.
That's why I'm asking you guys about it. 🤷♀️
Well maybe nostr:npub1yevrvtp3xl42sq06usztudhleq8pdfsugw5frgaqg6lvfdewfx9q6zqrkl could help me out!
OHTTP uses pre-defined routes and doesn’t have its own separate consensus mechanism so it’s far far simpler than Tor
The problem I see with tor (and VPN) is that it requires the end user to implement it. I'm looking for something that is maybe not quite as secure, but therefore baked into the core functionality.
Privacy for dummies.
Even with a VPN, you are revealing your IP to your VPN provider.
Yeah, some VPNs are just IP snoops. 😁
Single point of failure. I'd trust nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq3vamnwvaz7tmzv4mx7tnwdaehgu339e3k7mf0qydhwumn8ghj7argv4nx7un9wd6zumn0wd68yvfwvdhk6tcqyp7vx29q3hdj4l0elxl800hlfjp538le09epsf7k9zj59ue2y37quz59hlu and nostr:nprofile1qyghwumn8ghj7mn0wd68ytnhd9hx2tcprpmhxue69uhkxun9v968ytnwdaehgu3wwa5kuef0qyvhwumn8ghj7am9d33k7mt99ehx7um5wgh8w6twv5hsqgpass40an279ylj3dnz0yehqj3lhr8p2w4fr4us4vgldf6j639y95pykz24 over a VPN, so that's who I tunnel through.
Even with tor your revealing your IP to an entry node. Correct, the cycle does not end. No one can send you mail without knowing your home address. You could argue post office boxes, but that requires physical isolation, in that case find a place with free wifi to connect to I suppose.
Best bet so far is to run your own relay and strip the forwarding data.
I suppose to include here, you are often nost just trusting the relay hoster, but often CloudFlare for observing your plaintext traffic, IPs, and so on, or whatever datacenter/hosting provider the relay owner is using as well. I can't imagine most relay owners are hosting their relays from their home networks.
These are often American or European companies, and therefore less likely to be a threat to me, personally, than individual nutjobs.
Pick your poison.
I think mobile internet NAT stands the best scrutiny here. Probably a majority of users anyway.