Replying to Avatar Ben Ewing

🚩 False Dichotomies

1. “A network is either permissionless or authoritarian. Open or closed. Censorship-resistant or censored.”

✘ False dichotomy.

• Networks exist on a spectrum: some are semi-open (e.g. federations, permissioned blockchains, P2P overlays).

• Permissionlessness can also be partial (open to connect, but with rate limits or whitelists).

• “Authoritarian” is a rhetorical label — most systems balance openness with practical controls.

🚩 Spam & Security Assumptions

2. “Open networks inevitably run into spam and impersonation.”

✘ Misleading.

• True they are vulnerable, but mitigations exist beyond just PoW: rate limits, staking, identity attestations, proof-of-human systems.

• Saying “inevitable” ignores 30+ years of real-world open systems like email (with spam filters, DKIM, reputation systems).

3. “Sybil attacks, DDoS attacks, resource exhaustion… can only be solved via PoW + WoT.”

✘ Wrong.

• Proof-of-Stake, proof-of-space/time, trusted hardware, economic bonding, and many other mechanisms also mitigate sybils.

• Web-of-Trust (WoT) has historically failed to scale (PGP being the canonical example).

4. “I include sats in this equation implicitly, because sats are just difficulty-adjusted PoW.”

✘ Wrong.

• Sats are ledger entries, not work itself. The work (hashing) secures the chain; it doesn’t imbue the units with intrinsic PoW that can be “re-spent” elsewhere.

• PoW isn’t portable: you can’t reuse Bitcoin’s PoW to defend against email spam, DDoS, or sybils. The work is consumed once in block validation.

• Claiming sats = PoW overstates what they can do outside the Bitcoin ledger.

🚩 Identity & Money Claims

5. “Identity has to be cryptographic, which means taken and defended, as opposed to given.”

✘ Overstated.

• Cryptographic keys = control, but most identity in practice is socially anchored (governments, institutions, web-of-trust attestations).

• Purely cryptographic identity (keys alone) fails when keys are lost, stolen, or reset.

6. “Money has to be bearer instrument … cash, not credit.”

✘ Misleading.

• Most modern money is credit-based (bank deposits, treasuries). Bearer instruments (cash, gold, crypto) exist but are not the only form of “money proper.”

• This is more of a philosophical preference than a factual truth.

7. Keys and sats have the power to usher in a new era of the internet.”

✘ Overclaim.

• Keys already underpin the internet (TLS, SSH, DNSSEC). They don’t, by themselves, fix spam, identity, or governance.

• Sats are not a generalized anti-spam tool. Even with protocols like bithash on nostr, using payments as a universal rate-limit is impractical: too costly for normal use, easy to bypass via custodians, and risks centralizing around payment hubs.

• Cryptographic signing ≠ trust. Signing proves a message came from a key, but not that the key belongs to who you think, or that the content is truthful. Saylor’s “private-key identity” vision collapses without external social/organizational anchors.

• In short: keys + sats can improve certain systems, but they cannot alone restructure the whole internet.

8. “The Web is dead. Long live the web.”

✘ Rhetorical flourish, but misleading.

• The Web is evolving (Web3, federated services, p2p overlays). It’s not “dead,” just changing.

✅ In short:

• He sets up false dichotomies (“open or authoritarian”).

• Misrepresents sats as “just PoW.”

• Ignores non-PoW solutions to spam and Sybils.

• Treats WoT as viable at scale when history shows otherwise.

• Frames bearer-money-only as a necessity when in reality credit money dominates.

• Declares “Web is dead” for rhetorical drama, not accuracy.

it's a false dichotomy because there is a spectrum between open and closed networks. he doesn't mention authentication and paid services as a DoS and spam mitigation method. he doesn't mention simple stuff like temporary IP blocks for short term attacks (bitcoin's p2p network has this).

everything except for securing the money with PoW is a futile effort, just look up Bitmessage in the history. it is never going to work because if it becomes valuable to bypass it, there will be ASICs for bypassing it, and regular joes won't be able to crunch smaller message hashes than asics can, we already saw this game play out (and why i wasn't a maxi until the death of PoW in about 2019)

these proof of shit things don't do shit. it's a lot of watts wasted for nothing, because you can just have a permissioned system much simpler, and in the end proof of stake and proof of space/time stuff is ultimately vulnerable to all kinds of attacks, most of them not mathematical. proof of stake is completely vulnerable to determined attackers and they then become the threat in the system (i saw this happen in 2016, the bad guys know very well the power they get by early adoption and using their early adopter power to make the network favor them).

as for WoT failing, bullshit. it hasn't hardly even been used in email at all. it's just too easy to inject yourself into people's networks with all kinds of social attacks. it really doesn't scale beyond dunbars number, and everyone in the village has to be extremely skeptical of everyone. really you shouldn't even bother using it without actually physically meeting and there signing your attestations. but as one measure among a palette of options, it is a good way to build a base of confidence in a user not being malicious.

ultimately the best solutions involve subscription access to data storage and relaying on the network, because you can't game money. which is why the money is also so very important, it's the number one security mechanism, combined with authentication.

unfortunately most of the bobbleheads of nostr don't think that paid subscriptions and auth are good because it "closes up access to newbies" bullshit, because the walled garden app stores are doing perfectly fine with subscriptions and advertising and multiple tiers of privilege.

which is why i strongly agree with the point about this black and white absolutist thinking. nostr as a protocol does not have an opinion about any of these things. thankfully. unlike pubky, which is married to peer to peer network systems, and mastodon and bluesky which are married to pyramid federations, and shit like that ethereum social network, which is now pretty much ded, and always was rubbish, based on the IPFS consensus algorithm which doesn't scale. or the ethereum proof of stake bullshit, which also doesn't scale and is a false image of open, because the top stakers are in control of the consensus rules.

Reply to this note

Please Login to reply.

Discussion

also, i call bullshit on the thing about credit as money being ok, credit, debt, two sides of the same fiat coin. so long as there is a monopoly on issuance of credits there is an asymmetry in the power relations and theft can be achieved without any obvious trace of an attack having taken place. that's why bitcoin is so important (and i can tell that you are a chia fanboi because you mention proof of space/time, which also will not scale because state sized actors with their credit money can monopolise the required "space and time" access through their monopoly on money.

you have to be uncompromising about the hardness of the currency supply. it's a slippery slope that is absolutely not a fallacy. it's like the path to sexual assault, starts with bawdy expressions, continues to unwelcome touch, and then to rape, very quickly.

Comparing fractional reserve banking to rape is only something you’d read on Nostr. That’s more the reason why people know nobody will subscribe…