Replying to Avatar ContextVM

So pumped to introduce Realtr, our shot at decentralized trust and Web of Trust.

Trust is not an absolute quantity but a deeply personal and contextual phenomenon.

Discover more about it at https://relatr.xyz.

We are currently running a public instance, which is the default on the site. With it, you can search for and calculate trust for given public keys. Still in the early stages, but it's currently quite solid. Looking forward to hearing your thoughts and building this together!

blog: https://www.contextvm.org/blog/yItckCkpmTq-owE5AgYtq

nostr:naddr1qvzqqqr4gupzq6ehsrhjjuh885mshp9ru50842dwxjl5z2fcmnaan30k8v3pg9kgqyt8wumn8ghj7un9d3shjtnwdaehgu3wdejhgtcppemhxue69uhkummn9ekx7mp0qq2hjjt5vd45x6msd428ztt0wazn2st8t968z6wvrfs

Interesting, and glad too see more WoT providers joining the arena.

However, the linear approach I think will be insufficient and imprecise. Most of these checks are easily game-able, and some legimitate users might not pass them. So motivated attackers have an edge.

More practically speaking, the text similarity is a bit off.

Searching for jack doesn't show nostr:nprofile1qqsvf646uxlreajhhsv9tms9u6w7nuzeedaqty38z69cpwyhv89ufcqprpmhxue69uhhyetvv9ujucm4wfex2mn59en8j6f0qythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7snuh0e nostr:nprofile1qqs2rlzal4lleatrezg4tdrxw5d4srg3tcfkutuvjr5fzvu9h0kmrncpzamhxue69uhhyetvv9ujuvrcvd5xzapwvdhk6tcppemhxue69uhhjctzw5hx6ef0qyv8wumn8ghj7un9d3shjtnnd9sk6um5wghxxmmd9u9xr542 and nostr:nprofile1qqsvt7mwejrkupzcu0k2nyvwxuxte5mkjqw9s3s9ztl9x7jxukxr3wcpz9mhxue69uhkummnw3ezuamfdejj7qgjwaehxw309a6xzmr0dch8zat9wd6z7qg4waehxw309aex2mrp0yhxgctdw4eju6t09uaa9g82

And if searching for nostr, all results are off

Reply to this note

Please Login to reply.

Discussion

Hey! Thanks for your feedback. Yes, definitely the Relatr approach is more left side of the curve than Vertex or any other PageRank algorithm. However, the approach that Relatr is following is still consistent since the base of the score calculation is based on the distance between the source pubkey and the target pubkey. In the default instance we are running, the source pubkey is gigi, so in order for an attacker to impersonate someone, it will need gigi to follow them or a gigi's contact to follow it. But the farther the distance, the bigger the decay, so fundamentally an attacker would need to do some social engineering to make it closer to the source pubkey to some degree, which is not easily gameable, especially if the social graph realizes it is an attacker/impersonator and publishes a mute list with the attacker pubkey in it. The other validators are easily gameable in some way, yes, like valid NIP-05, NIP-10002 events published, yes, that's easy to game, but the weight it has in the score calculation is little compared to social graph distance. There are also other validators that aren't easily gameable, like reciprocity (source and target follow each other), and we are thinking in adding some more like zaps and activity. In summary, this is an experiment, but so far it is working pretty well as tie breaker to determine which pubkey is more likely to be an impersonator or the "real" one, and ideally everyone runs an instance that sets their pubkey as source so the trust score comes from their perspective.

On the other hand, yes, the other relevant Jack didn't appear because they weren't being discovered during the first profile metadata sync that Relatr does. This is a bug; it's still early days, but after searching explicitly for them, they now appear as they are added to the metadata DB. Also, when you look for Jack.

glad you solved the bug about the jack's.

About attack's resistance, distance-based WoT is inherently weaker than Pagerank becaus eyou just need one compromised (or lazy) key at distance n to include an impostor at distance n+1.

Instead Pagerank considers distance as well as flow, which is the number of paths that connect a target to a source.

1 path is gonna give much less rank compared to 100 distincts paths, while the distance is going to be the same

That's for sure; the key here is still that the trust is computed from a specific source pubkey. So, if there is a more relevant pubkey in the social graph than the impersonator's, it will rank higher because it will likely have more favorable validators. Definitely, this approach can be improved and strengthened. We could sample distances to a target pubkey from different direct contacts of the source pubkey to get more paths validated. The architecture will allow this thanks to the Nostr social graph lib by nostr:npub1g53mukxnjkcmr94fhryzkqutdz2ukq4ks0gvy5af25rgmwsl4ngq43drvk that we are using.

Thanks for the feedback; it is very appreciated. As we mentioned, this is still an experiment, and we need to keep tweaking it to get more relevant results and metrics.