Replying to Avatar hodlbod

Remember how I was writing a book? Well, I gave up on it. But then I wrote a different one:

https://building-nostr.coracle.social/

This book is both practical and philosophical. It ellides a lot of the details you can otherwise get by reading Nostr NIPs, focusing instead on all the things I've learned over three years working on nostr.

It includes a number of contrarian opinions which may be partially or completely wrong. Feel free to disagree, or even tell me where I'm wrong. I'll be releasing updates to the book as I have time and inclination to repent of my mistakes and omissions.

The book is free, with epub and pdf versions available for your reading pleasure. If you like the book, you can send me bitcoin via nostr or at https://geyser.fund/project/buildingnostr, and if people like it enough I may publish a version that you can touch with your fingers.

What did Claude miss or get wrong?

Core Architectural Insights

Simplicity Over Perfection: The author discovered that Nostr’s “good enough” approach works better than trying to build perfect solutions. Using WebSockets instead of more advanced P2P tech, embracing “easy” over “simple” in Rich Hickey’s terms, allows rapid adoption and iteration.

Numbers Not Names: Using numeric event “kinds” instead of descriptive names was brilliant - it prevents semantic drift and allows organic meaning to emerge through usage, like natural language evolution.

Embrace Chaos: The radical openness creates complexity, but this complexity enables agency rather than diminishing it. The protocol becomes “infinitely extensible” through the kind system.

Identity and Data Sovereignty Revelations

Signed Data Changes Everything: Moving from server-based authentication to cryptographic signatures fundamentally shifts power from platforms to users. Data becomes “referentially transparent” - you can verify authenticity without trusting custodians.

Identity Webs Over Trust Graphs: Rather than explicit trust attestations (which fail like PGP), implicit social signals through follows, mentions, and reactions create more robust reputation systems.

Publicity Technology: Nostr isn’t privacy tech - it’s “publicity technology” that makes public discourse more sovereign and less capturable by platforms.

Network Architecture Learnings

Multi-Master is Essential: Using multiple relays isn’t just redundancy - it’s the core censorship resistance mechanism. The author notes that 3-5 diverse relays dramatically reduce deplatforming risk.

Routing Heuristics Are Critical: The “Outbox Model” and similar patterns for intelligent relay selection are what prevent the network from collapsing into either aggressive replication (unsustainable) or missing content (unusable).

Relays as Repositories: Keeping relays simple as “buckets for events” rather than complex application servers maintains interoperability and reduces implementation burden.

Protocol Development Philosophy

Implementation-First Works: Like JavaScript, starting with working implementations and iterating beats top-down specification. The author compares Nostr to “the JavaScript of web protocols” - messy but successful.

Backwards Compatibility Trade-offs: Perfect compatibility isn’t always worth the complexity cost. Breaking changes should be rare but not forbidden when they serve users.

Political Dimension: Protocol development is inherently political - requiring human coordination and compromise. Technical solutions alone don’t solve governance problems.

Economic Model Insights

Value-for-Value Mechanics: Micropayments through “zaps” can realign incentives from attention-farming to genuine value creation, though the author notes this works best in smaller communities.

Patronage Over Trade: Digital content monetization resembles patronage more than traditional commerce - supporters get identity and belonging rather than just content.

Custody Challenges: Both Lightning and eCash approaches have trade-offs between convenience and sovereignty that the ecosystem is still working through.

Community Building Discoveries

Different Spaces for Different Communities: The author identifies five distinct community types (social clusters, group chats, discussion forums, owned communities, commons) that need different architectural approaches.

Access Control Complexity: Moving from broadcast to private/semi-private spaces introduces enormous complexity that can’t be solved purely at the protocol level.

Interface Diversity: Different clients can provide different interfaces to the same underlying data, but this requires careful specification of expected behaviors.

Challenges and Warnings

Bootstrapping Problems: Getting people started without custodial solutions remains difficult - key management and relay discovery are ongoing challenges.

Scaling Concerns: Aggressive content replication doesn’t scale; intelligent routing is essential but complex to implement correctly.

Capture Risks: While more resistant than other protocols, Nostr could still be captured through “embrace, extend, extinguish” tactics if the community isn’t vigilant.

The author’s main meta-insight is that building protocols is ultimately about building communities - the technical architecture must serve human flourishing and agency, not the other way around. Nostr’s radical openness creates a “convivial tool” that amplifies human agency rather than constraining it, even if it means accepting more complexity and chaos than top-down alternatives.​​​​​​​​​​​​​​​​

Reply to this note

Please Login to reply.

Discussion

Guess I should have just vibe coded my book

Its temping, but it never produces things actually worth reading...if not for the simpel fact nobody bothered to write it in the first place.

Didn’t mean to undermine the value of your work. I just work crazy hours so this way at least I get something out of it

Thank you for writing this by the way. I need to set up a wallet