From WEB1.0 to WEB4.0
by Btcdage
This article lists the characteristics and advantages and disadvantages of WEB1.0 to WEB4.0 (nostr), and chats with others.
【WEB1.0】
BS architecture, B is the browser client, S is the server.
1. All data is published on the server by the platform owner, and users can only passively accept the data returned by the server through the browser.
2. The property rights of the data belong entirely to the platform owner, and the platform owner (server administrator) has the authority to add, delete, and modify all data.
Cons: Lack of user involvement in data collection
【WEB 2.0】
BS architecture, B is the browser or APP "client", S is the "server".
1. Data can be published by users, and the data is stored in the central server (or cluster) of the platform owner.
2. Users log in to the platform through their accounts and passwords, and all account data including passwords (which may be encrypted) and other sensitive information are also stored on the platform
3. In the owner's central server (or cluster). Different platforms need to register accounts separately, and user information cannot be used across platforms.
4. The property rights of user data belong entirely to the platform owner, and the platform owner has the right to restrict or even ban user account permissions, as well as modify or delete user data.
Progress: Users are deeply involved in the collection of data
Disadvantage: Users cannot protect their rights to their own data and let the platform handle it. The platform itself is also easily restricted or shut down by Iron Fist.
【WEB 3.0】
BS architecture, B is the "DAPP" accessed by the browser or APP, and S is the "blockchain".
1. The data is published by the user, and the data is stored in the blockchain (regardless of meaningless non-public chains).
2. Through cryptography, the user uses the corresponding asymmetric encryption algorithm according to the difference of the public chain, uses the public key (address) as the account ID, and the private key as the signature credential. User private keys are not stored in any server. The "user account" of the same type of public chain is common (for example, ETH/BSC/OKC/KSC are common, and cannot cross public chains of different types), but other user data are only stored on a separate chain used by the platform, and cannot be used across chains .
3. Although the public chain is in an ideal state, the metadata cannot be modified or deleted. But through the smart contract, the platform side actually controls the user data pointer. In addition, the version upgrade of the smart contract is completely controlled by the platform side. Users still have no real rights over their own data.
Progress: User passwords are no longer used for account authentication, private keys are controlled by users alone, and independence, security, and privacy have been greatly improved.
Disadvantages: The data is still actually controlled by the platform side. Through smart contracts, the platform side can still restrict or even ban users.
[nostr protocol (WEB 4.0)]
BS architecture, B is the "client" accessed by the browser or APP, and S is the "repeater".
1. The data is published by the user, and the data is stored in any number of repeaters.
2. Through a unified asymmetric encryption algorithm, the user uses the public key as the account ID and the private key as the signature credential to authenticate identity and operations. This account authentication happens on the client side and is generic and independent of the relayer.
3. The administrator of each repeater can only trim the data of the repeater set up by itself (it can only be deleted but not modified, because the modification of the data requires a private key signature, and the tampered data will be discarded by the client). Although there is no automatic synchronization between repeaters, since the client connects to several repeaters at the same time, it can publish data to these repeaters at the same time. Reading is also reading several repeaters at the same time. Therefore, the deletion of user data of some repeaters will not affect the use of users. The administrator of any repeater cannot ban a user's data (whether it is account information or published data).
4. Repeaters are easy to build, and anyone can build their own repeater to realize their own data copy. Strengthened decentralization to ensure the realization of the third point.
progress:
1. User accounts are completely generated by encryption, and all platforms are common. For the first time on the Internet, "users have the right to actually own their own account data".
2. User decentralization. Due to the progress of the first point, user data is completely cross-platform for the first time. Different platform clients access the same batch of repeaters, and the returned data is exactly the same.
3. Decentralization of the client, as long as the client is developed according to the nostr protocol, it can read data from the repeater. For example, iris and astral are different clients, but the read data is the same. So that users no longer worry about the platform being sanctioned by an iron fist - if one client site cannot be accessed, another one will be replaced. If the client is made into an application or app, it will be more completely decentralized.
3. The decentralization of repeaters makes it impossible for power to completely block data sources, improving the robustness of data.
Under the nostr agreement:
1. Repeater administrators have full rights to their own repeaters, but cannot interfere with user rights.
2. Users have complete rights to control their own data, but cannot interfere with the rights of a repeater administrator.
3. Entrepreneurs of the application platform can review and screen the data on the client side when they release the client according to their own judgment, and can also add advertisements and other services, but they cannot interfere with whether the user chooses to use other clients to The right to access the relay, and cannot interfere with the management of the relay established by others.
Everyone manages the things that belong to their own property rights, and has no right to interfere with the rights of others. The results of any of your actions are handed over to the market.
This is the philosophy of the nostr protocol, and it is also an important reason why it is qualified to be called the future WEB4.0.