Avatar
s3x_jay
667205eb525aa4a794859b2bd2bdd16e64ff57fd600880500fc53cdbf476439e
I'm the guy behind https://s3x.social and a bunch of other sites. For ~15 years I've focused on building & running #gay sites. I'm also one of the Community Ambassadors at https://XBiz.net - the #porn industry's leading B2B discussion forum. #LGBT #NYC #Harlem

If you own a lot of domains and want to cut the cost…

- Become a ā€œresellerā€ to get lowest prices - even if you don’t actually resell. I use ResellerClub.com

- Don’t pay for private registration. Instead put in ā€œwebmasterā€ for your name and then use a PO Box or some other legit address to avoid doxing yourself.

Are there benchmarks for the time it takes to do PoW?

I ask because it sounds like you’re saying that the same level of difficulty would be a negligible delay for a bot on a fast server, but take an unacceptably long time for a human using a web browser.

In that case bots will have an advantage over many real users.

Generally agree, definitely like the way you’re thinking. Two thoughts though…

Having an LN paywall on the relay recreates the problem I was trying to avoid… I’m not sure it’s legal to require payment to report content problems. e.g. a copyright holder shouldn’t have to pay someone who’s violating their copyright. But PoW isn’t payment, which is why that might work.

But then there the problem that PoW is really slow in browsers (see screenshot below). It can’t take a full minute for browser-based users but be instantaneous for bots on servers. That makes no sense.

How do you do rebills with Lightning? It’s a critical question for more than relays.

When I brought up the topic of Lightning for porn sites the site owners’ response was ā€œbut we’d lose rebills and rebills are the bulk of our incomeā€ā€¦

Potentially dumb question… Is the Lightning network basically proof-of-stake?

Here’s more on Nostr Kids…

https://www.boppow.com/coming-soon-01-2

But #[4]​ & I are working on content moderation that, in the long run should make things a lot safer for kids.

A better comparison is the key to your house. Passwords typically need a username as well. Keys don’t. ā€œPrivate keyā€ isn’t very sexy. But every nsec starts with nsec, so not too hard to remember.

"May the 4th be with you"…

Episcopalian response: "And also with you…"

I looked at spam.nostr.band… I see existing strategies (e.g. "follower networks") plus NIP-69 (user-specified moderators → feed filtering) as solving the spam issue for users - except perhaps in their "global feed".

Public relays have a big spam problem. You've devised some strategies for that, I'm sure others have as well - but that's beyond my personal area of interest or expertise. (Though I am curious to hear what works.)

Paid relays will have a problem with moderation report spam since it's a catch 22… If they make it so only paid members can file moderation reports, then they have a legal problem. If they make it so anyone can file a moderation report then they have a potential spam problem. They can start by ignoring reports about content that's not on their relay. But they can still be spammed. Which is why I'm so glad nostr:npub1ktw5qzt7f5ztrft0kwm9lsw34tef9xknplvy936ddzuepp6yf9dsjrmrvj mentioned PoW as a possible solution and want to understand that better.

Beyond that - I would look for unusual patterns of reports. First, take out the reports from people (and bots) you trust to one degree or another, then…

- Are there a high number of reports about the same piece of content?

- Are there a high number of reports from the same IP? (use /64 for IPv6)

- Are there a high number of reports from the same pubkey?

- Is the report from a new pubkey?

I monitor for (non-Nostr-related) attacks on my server now. Everything from SQL injection to blog comment spam. It's all IP-based. I look for "bad neighborhoods", so if there are too many IPs with infractions in the same subnet, I block the entire subnet. (More easily done with IPv4 than v6.)

I think pubkey age is a great metric. I see Primal has that data. You probably do as well. That's valuable data! I'd love an API that could be hit to query on the age of suspicious pubkeys. In exchange relay owners could probably give you hashes of IP addresses without compromising privacy laws - so you could answer the question of whether pubkeys are coming from the same IP (without knowing the IP).

#[5]​ Nostur had the same results as Damus… Displayed `nevent` properly on the feed, but failed on search…

Doing a test to see how different clients handle `nevent` (spec'd in NIP-19)… Both how they render it in kind 1 events and whether they handle it properly when you put it in as a search. Here's the nevent for the note this note is in reply to. It contains a relay hint of wss://relay.s3x.social - which should be all the clients need to find the note and display it. Let's see which clients handle it correctly…

nostr:nevent1qqsv64v4yxl0ata00j37pwee7p9lyj0f23mjycmhhp68ma2c2y8cuzspzemhxue69uhhyetvv9ujuuen0qh8xmmrd9skcxf7yef

Interesting… Sounds like a solution that would help relay owners deal with floods of bad reports.

I’m not a crypto guy and don’t really understand how the PoW part of Nostr (NIP-13) works. Can a relay owner turn that on for just moderation reports? The idea is it slows down the reporting, right? Is POW done for every relay they send to? What happens if they use a blaster relay? How does the relay tell the user PoW is required and what level of difficulty?

I’d be happy to add that to NIP-69 if I can get my head around how it works.

Again - we’re more on the same page than you might think.

Please read the latest commit to the PR. We’re on the same page. Nothing is centralized.

https://github.com/nostr-protocol/nips/pull/457/commits/724e05e762a634e501bdcf6cbefaa91f99b1903b

In fact Rabble had me look over Bluesky’s content moderation model and my comment was that it sucks because it assumes a central moderation team that ā€œresolvesā€ reports. (No one can definitively resolve anything in a decentralized environment.)

Regarding spam. I’m expecting DDOS style attacks by haters who want to silence people. (I’ve already had death threats on Nostr. This is personal for me.) Those DDOS attacks are possible now (especially for getting someone muted on Amethyst). It’s one reason why I’m pushing for a complete reboot of the content moderation tools.

NIP-69 now clearly states that clients should only act on reports by ā€œpeopleā€ designated as moderators by the user. What that means is DDOS attacks are of little value. They’re like shouting into a void - no one’s listening. They’re only really a problem for relays, not end users.

Nostr clients need more support for `a` tags & `naddr` / `nevent` / `nprofile` IDs with embedded relay info. They’re incredibly powerful. Situations like in the pic shouldn’t happen.

Replying to Avatar Jeff Swann

When ETH was created Vitalik & friends issued themselves 70% of the supply. There were very quickly miners competing to collect the mining reward & they had interests somewhat separate from those of Vitalik & friends. So whenever they wanted to make a code change they had to get miners on board or consider how miners might respond. It was still centralized enough that it wasn't a great check on power, but it was something.

The switch to proof of stake was just Vitalik & co stealing the mining reward for themselves & removing an obstacle to doing whatever they want with the code.

Having a system where people just get paid via monetary inflation for having money is naturally centralizing. There is no merit based competition that keeps people having to earn the position of collecting the block reward. And the largest holders can collectively decide that the code is whatever they want it to be. They can double the money supply tomorrow into their own wallets. And they won't allow average users to stake without handing their ETH over to a custodian.

PoS is a snake eating it's own tail. There's no grounding, it what it is because the people who have all the money say it is & they get more money because they have money.

Bitcoin rewards people who feed it energy most efficiently. It is fairly easy for the average person to run a full node (ETH calls these archival nodes) which will not allow anyone to change the monetary policy. Anyone with a computer can reject code changes in Bitcoin. No staking or mining or majority share of Bitcoin supply needed. Anyone can compete in the mining game, no massive % of the supply needed or minimum stake limit involved. You can literally mine with a $70 jade hardware wallet if you want.

Thanks for your answer. Among other things it seems to explain bitcoiners’ seemingly strange (to me) obsession with inflation. Your competitor is run by a system where there is reward for inflation, so it’s something you folks are acutely aware of).

It also gives me insight into why you guys think seem to think fiat is a Ponzi scheme, when I’ve always felt people pushing crypto as an investment had an Ponzi-like aspect to their argument. (I’m 110% in on crypto for commerce- it’s the investment angle I’m seriously skeptical of). That gives me additional points to think about…