Avatar
Elephant in the root
6e77f4f3c9995e0887d02dc95b39692f58641ed5b073972ef86cd6b61ecc6bae
Poisonous anti-plantist, anti-fungist, anti-shitcoinist, anti-governmentalist, anti-wokist, anti-bullshitist.

I'm sure it's satire but it's indeed not obvious enough, so it doesn't work that well.

Even if the protocol very strictly mandated, in NIP-01, from the very beginning of Nostr, that relays delete events upon request, how would you ever be sure that they do? Anyone can develop a relay that doesn't. You could argue that such relay wouldn't qualify, technically, as a "Nostr relay", but so what?

Also, even if everyone avoids such relays (how would you? They could just selectively refuse to delete some of the notes. They could even hide them for two years, just to trick you, then put them back online), anyone can build a Nostr archive which pulls from public relays, then publishes all notes and refuses to delete them.

You could rely on the law and sue such relays, but they can be in any country and/or behind a darknet.

> Nostr, as it is right now, is a permanent record that seeks to tie all of your apps and your coin transactions to one key pair.

Don't use it for anything related to "coins". Use it for things you want to stay published.

> Relays must use the protocol to participate in the network.

No, they do not have to. They can break the protocol in tactical ways that will still allow clients to interact with them.

> If the protocol requires honoring event deletion requests to participate in the network, then Nostr will have avoided this festering security and safety issue.

Absolutely not. You can just build a non-compliant relay.

In the context of security you *NEVER* assume that your "attacker" will comply with any rule whatsoever.

Every party gets to decide everything about their own behavior and you must act in a way which will be secure regardless of the ways in which others will act.

You can't "defend" yourself from "bad" relays by telling them to delete events. There is nothing you can do that will make them do so, unless they are well-meaning.

But even if all relays you use behave the exact way you want (which you can only know if they are run by parties you know and trust), anyone can and will do whatever it is that you hope won't happen: get on Nostr, fetch notes and publish them again, refusing to delete them.

If you aren't assuming someone *will* act against you, in the smartest way they could, you are not doing security.

Exactly. You cannot unpublish information for the same reason you can't unleak a key.

I was thinking and I've found a pretty good steelman regarding geoengineering: the sprayed chemicals are not visible by naked eye and the white stuff is just water condensation.

Then possibly some government agency invented and spread the idea that the white stuff is the chemicals to make whistleblowers look absolutely ridiculous.

Also the idea that the chemicals are sprayed from commercial airplanes. They are not because the staff would definitely notice.

It is because it's crypto money. Currency is issued by government, money emerges in the market.

Yes, that too. You can use Rpis pin to transmit FM radio for instance. Which gives me crazy idea: if you transmitted a fake ad "call and say to win 1M dollars" how many people could hear it and would call?

They have cheap BLE tags. If those cannot be reverse-engineered maybe you can record their beacons without the reach of any other device and then just replay them. Buying 256 tags may be worth it if the victim stores tens of millions satoshis.

I'd be really surprised if there isn't any way to sneak out 256 bits of data. Or less if the attacker wants to do some brute forcing.

The attacker could pretend it's 256 devices and transmit the seed by simply sending or not sending a message. It's not that high number.

I don't know how small GSM is today but I know that ten years ago the smallest widely available wifi module was around 100 times larger and 10 times costlier than today. So it migh become feasible in the future. There are other radio communication protocols as well.

If that happens you're screwed anyway. A compromised HWW might as well contain a radio transmitter.

We need better tamper-proof seals.

Actually they're doing Bitcoin a favor.