I think there's some confusion around this because of abuse of terms.

When people talk about data harvesting on other platforms its *insanely invasive*. Things like tracking every click you make in the app, your search history, tracking every piece of content you view and for how long.

Most nostr clients today have none of this. All people can collect are public actions that you have already consented to. nostr data is transparent so you know what you're putting out there.

Not to mention with giftwraps, relay group chats, encrypted group chats... we are beginning to hide a lot of this stuff.

nostr:note1wms36kxh30tt8dmx9xcjy96cxxu25wfpjemrtf62kgzuwqsgua4spc69pt

Reply to this note

Please Login to reply.

Discussion

Thanks for this additional detail. I think we should be finding similar and clear ways to explain this to normies as well!

c'mon man, don't tell the secrets of nostr! people will be scared that it's too free or something

This. There are different degrees of tracking and harvesting data. One is extremely invasive. One is following public data.

nostr:nevent1qqsvhcy2ct9c4272fxhn3mr3aaahyvrm5cwtcwcguhrsdut2r5dsp0gpzdmhxue69uhhwmm59e6hg7r09ehkuef0qgsr9cvzwc652r4m83d86ykplrnm9dg5gwdvzzn8ameanlvut35wy3grqsqqqqqpq6p82c

Thanks @jb55 I was not aware of this and assumed that data harvest would be insane on Nostr naturally. Maybe some more discussion on this would be nice

yeah it's kind of subtle until you dig into the details. the data I saw being collected when working at startups was horrifying. complete playback of the cursor during browser sessions, etc.

What about on the relay side? Are they typically collecting/tracking less, more, or different data than clients?

lol beat me to the question, sorry about the duplication

How much insight do the relays have? I guess IP address and a rough timeline of requested & pushed content associated to the IP? Probably not nearly as bad as the classic data harvesting model.

they can see what threads users are reading based on queries is probably the most invasive thing. the queries reveal a lot of what a user is doing on the network. this is the same with anything though.

It’s really in the best interest of relays to make everything as encrypted as possible. Public data is just more liability and responsibility on them.

This is a great distinction. Exfiltration of metadata is different than OSINT.