Avatar
Bugtus
86448dded57eed414e608669215772355ec80855a09c09a7ce2180c689eb3ba6

Very nice work!

Though I do worry that having to burn sats for every event will be too big of a UX hurdle to gain widespread adoption.

That's why I've been working on a spam deterrent where users have to time lock sats instead of actually having to spend them. A legit user incurs near-zero costs, whereas attackers must immobilize capital proportional to the number and lifetime of identities they maintain. If you, or anyone reading this, is interested, check out my latest post. I'd love feedback from the community!

Still, proof-of-burn is very interesting and might be needed as the ultimate deterrent at some point. Thanks for writing the paper!

"Don't think I like deliberately burning the money", "Maybe better, but still makes messages mostly for the rich?"

100% agreed. That's why I'm trying to create a spam deterrent that works by time locking sats, not actually spending then. While proof-of-burn is really interesting and would definitely be a strong deterrent, I do worry the UX hurdle of having to spend sats for every little action might be too high to gain widespread adoption.

If you, or anyone reading this, is interested, check out my latest post. I'm desperately looking for feedback from the community!

Replying to Avatar Gigi

It's at a point now where it's almost impossible for me to use the "regular" internet. I can't access half the sites. The reason? I care about my digital hygiene and thus use a VPN. Sometimes switching to a different VPN or switching the country of the VPN works; other times it does not. Oh well, I guess I'm not going to watch that video, or read that article, or look at that picture. Whatever.

In addition to that, if I'm not blocked completely, I have to prove that I'm human every step of the way. Captchas, re-captchas, Cloudflare checkboxes, the whole shebang. I am human. I promise. And I am very annoyed. Outright angry, even. I doubt that any robot will ever be as annoyed as I am right now about the current state of the internet.

What annoys me most, actually, is that all these measures don't really work. There's bots everywhere. Robots get access to the stuff anyway, using farms of humans, just like in the good old days of WoW gold farming. The centralized "safety" nets of Cloudflare et al brought down large swaths of the internet multiple times in the last couple of weeks alone, and as things centralize more and more these outages will happen more and more.

I'm very close to breaking up with the legacy internet. I'm human, I can cryptographically prove that I'm human, and I have sats to spend. But the legacy internet doesn't care about that. It cares about farming me and my data, while annoying me to no end. I've been nostr only for a while now, but that was only on the "social media" side. 2026 might be the year where I go nostr-only for everything, or to phrase it slightly differently: permissionless for everything.

No more "are you human?"

No more "I'm sorry, Dave. I'm afraid I can't do that."

No more cookie banners, paywalls, and AI slop.

No more being treated like a child.

Even if it means that I'll have to self-host everything.

Even if it means that I'll have to build & maintain stuff myself.

Even if it means that it's a lot of work and pain.

Nothing worth having ever comes easy.

But the easy stuff is not worth having in the first place.

Here's to the year to come, and the new corner of the internet, build on cryptography and webs-of-trust. Real value. Real connections. Real humans.

Here's to nostr.

"I can cryprographically prove that I'm human"

Are you talking about WoT here? Would love to know!

I'm trying to tackle the problem of bots being everywhere while legit users still have to deal with annoying counter measures (e.g. CAPTCHAS) in my master's thesis. The idea is to time lock sats to get tokens that can then be spend to access web resources. A legit user incurs near-zero costs, whereas attackers must immobilize capital proportional to the number and lifetime of identities they maintain.

See my latest post if anyone's interested. I'm desperately looking for feedback from the community 😅

"Time locked sats as sybil/spam protection"

If this sounds interesting to anyone, I'd love to share the whole draft with you. I'm desperately looking for feedback! 😅

Just realized that for the 'Blank Check' approach to work, we have to make sure that only a single party has access to a specific set of blank checks.

Otherwise, we run the risk that a check gets used twice but Carol can only redeem it once.

If we have to restrict access to the checks, that probably defeats the original purpose: 'An offline receiver could publish their public key and the online sender can prepare a suitable BlindSignature from the mint.'

I don't think *this* is a problem. If Alice and the Mint collude they can always unblind C_, so this isn't really a downgrade from standard cashu.

However, there is an attack where Alice just lets the Mint sign Y twice. Once with Carol's public key B_ = Y + r * F and once the standard way with B_' = Y + rG.

Now, (x, r_, C_, DLEQ) looks like a valid token to Carol even when offline. However if Alice spends her token before Carol, Carol's token will get denied because the secret x is already in the Mint's spent set.

An idea to fix this:

1. Carol generates a bunch of secrets x, blinds them (B=Y+rG), and publishes these "Blank Checks" (B_'s) somewhere. She can then go offline.

2. Alice grabs a B_, pays the Mint to sign it (C_), and sends it to Carol. Alice cannot have Y signed twice (like in the prior attack) because she doesn't know x.

3. Carol receives C_ and the DLEQ proof. She verifies the proof against her original blank checks and the Mint's public key. If one of them passes, she has cryptographic proof that C_ is the valid signature for her specific B_. Since only she holds the secret x, she knows the token is safe and unspent. She can unblind it later when she is back online.

Not sure if I'm making any mistakes or the first step defies the purpose you want to use this for. I'm pretty new to all of this myself. Would love to hear what you think!

pos as in proof of stake? Where can I read more about this?

Although Bob is the mint

nostr:nprofile1qqsqa6p85dhghvx0cjpu7xrj0qgc939pd3v2ew36uttmz40qxu8f8wq8vdeta Why does Bob send hash(r1, r2, a, c') to Alice in the first place? Afterall, can't Bob just send r1 and r2 to Alice, Alice challenges him by sending back a random number e and Bob sends back s = r + e*a. Wouldn't that also prove that he used the same private key for the signature and his pubkey?

Cashu tokens backed by a time lock of sats, not actual sats.

Maybe a useful spam deterrent 🤔

Glad it made you laugh 🤓 Thanks for your work on Hashpool, looks really cool!

Yeah that does in fact sound like a mistake 😂Canned 'Krombacher' from Aldi will always remind me of my days at university so it has a special place in my heart but there sure are much better beers out there

Tell me about it... Writing my master thesis at the applied cryptography lab just because I really enjoy btc/LN/cashu might not be the way to go 😅

Hope you don't mind me asking but shouldn't NUT-12 be mandatory, because without the DLEQ proofs a mint could theoretically tag every minted token with its own private key? As far as I understand it, this could then be used to recognise the tokens once they eventually get redeemed?

I could definitely be off, just trying to understand it better. Thanks for all the great work you do, very inspiring!