Avatar
exmp
e0dd414aeab6feb747dc83623d2aa89d18b00c8d61b9199fd4d82ceba8a2d48b
Mostly about #energy #climate and #computing. #free🇵🇸 Views are my own. Exploring #Nostr from 🇮🇹

In a web of trust, no one follows the impersonator. So his mass reports have no value. Same discourse for any sybil network. Only trusted (followed) people contribute to a WoT score.

Replying to Avatar hodlbod

Nostr will fail to the extent that people can't tell an impersonator from the real thing. The number of reports I get about my impersonator indicates to me that nostr is failing. But it doesn't have to be this way! Web of trust fixes this.

Let's play a game of "spot the impersonator". I created a fresh impersonator account with a valid NIP 05 from nostrplebs and all the same profile data. I didn't bother to clone my notes or create a bunch of sock puppet followers, but that could easily be done, and would improve the resemblance.

Coracle:

Pretty good if I do say so myself. Social trust is shown in two separate ways: web of trust indicator and followers tab (although followers is not complete or sybil resistant).

0xchat:

Exactly the same, other than NIP 05 address, which I don't consider any sort of validation at all. This is a classic phishing maneuver, and recently allowed nostr:nprofile1qyfhwumn8ghj7am0wsh82arcduhx7mn99uqjzamnwvaz7tmjv4kxz7fwwd5xzamw09jkzem9wghxxmmd9a5kucn00qqjqamnwvaz7tmjv4kxz7fwwd5xzamw09jkzem9wghxxmmd9a3ksct5qy38wumn8ghj7un9d3shjtnndpshwmnev4skwetj9e3k7mf0da6hgcn00qqjxamnwvaz7tmjv4kxz7fwwd5xzamw09jkzem9wghxxmmd9ac8y6tkv96x2qpqclk6vc9xhjp8q5cws262wuf2eh4zuvwupft03hy4ttqqnm7e0jrqlg4lcf's impersonator to trick some people.

Yakihonne:

Some social indicators are shown, but are not sybil resistant. They're also down the page a bit, and might not be noticed by users.

Jumble:

No social proof indicated at all — the tabs at the bottom can easily be faked by the impersonator.

Nostter:

No social proof, and failed to validate the NIP 05 for the real user.

Nostrudel:

Nostrudel does something original in showing the public key color. But how often are you going to memorize a user's color? I'd argue this is even worse than nothing because it obscures the NIP 05, which _might_ tip you off.

Iris:

Iris shows wot-vetted "known followers", which is good. In other places, a wot-based check mark is shown next to user avatars. This should probably be added to the profile page too, but still, pretty good.

Amethyst:

Amethyst shows some social proof, but it's hard to tell exactly what those profile pictures mean.

Primal:

Like yakihonne, social proof is visible, but not sybil-resistant.

Let's take a look at search now. Some clients do a much better job at this, some do a MUCH worse job.

Coracle:

WOT indicators, correct sorting, complete results. Arguably, the impersonators should be filtered out entirely, but I personally prefer to have them included.

Jumble:

Same thing, minus WOT indicators. Not bad.

Nostrudel:

It's a pass, but I'm not sure if duplicates are filtered out on purpose or not. The check marks indicate NIP 05 validation, not wot validation.

Yakihonne:

Only shows the legit version, along with a badge (I'm unsure if it's NIP 05 or something else). Pretty good.

Iris:

Very limited results, WOT-based check, pretty good.

Primal:

Eliminates impersonators, show follower count, pretty good (though not sybil resistant in all cases).

The winners are Iris and Coracle for web of trust indicators, and Primal and Yakihonne in the "global view of the network" category. I'd love to see this get better though, and not just because I am now famous enough to have an impersonator. WOT calculations are low-hanging fruit, especially with the vertex DVM by nostr:nprofile1qythwumn8ghj7un9d3shjtnswf5k6ctv9ehx2ap0qyt8wumn8ghj7ct4w35zumn0wd68yvfwvdhk6tcpzemhxue69uhk6mr9dd6juun9v9k8jtnvdakz7qg4waehxw309aex2mrp0yhxgctdw4eju6t09uq3wamnwvaz7tmjv4kxz7fwdehhxarj9e3xzmny9uqzpa5rapcrtaadfazwpwvvl0v4xlskg4df9nfcem7yevcaka2h7hhjm9zju5 around. Getting this right is a core value proposition of nostr and is worth the effort.

WoT scores should also take into consideration reports. Is this the case right now?

Yes, the most important innovation of Nostr lies in its decentralized model, which is both simple and effective. Features like Zaps are appealing, but ultimately they are add-ons, functionality that could be integrated into other platforms as well.

Decentralized distribution is a foundational aspect of the protocol, something that must be built into the architecture from the ground up.

Yes, restricting PoW to users outside the WoT is a thing, and makes somewhat sense.

But still I don't understand why not captchas or similar in this scenario. These are more effective than PoW, as they burn human mental resources, not just cheap CPU cycles, and are hard to automate.

PoW is effective in the context of DDoS attacks, where an attacker generates millions of connections in a short time. In such cases, even a small computational cost per request, when multiplied by millions, becomes significant for the attacker, but remains manageable for legitimate users.

Spam, however, is a different problem. A spammer publishing just 1,000 notes per hour could still inflict substantial damage on Nostr relays, overwhelming storage and flooding the relay global feed. In this case, the computational cost of PoW (especially at < difficulty levels) is negligible for the attacker and not a meaningful deterrent.

The situation is much closer to the email spam problem, where PoW was also explored and ultimately abandoned due to its ineffectiveness. In fact, Nostr's case is arguably simpler from the spammer’s perspective: notes are public, require no targeting, and have virtually no delivery constraints.

So my initial point remains: NIP-13 is unlikely to be effective as a spam prevention mechanism, just as PoW proved ineffective against spam emails.

So I now understand that Tor nodes can enable PoW as a defense mechanism against DDoS attacks, as described in

https://gitlab.torproject.org/tpo/core/torspec/-/blob/main/proposals/327-pow-over-intro.txt

The goal is to mitigate connection-level flooding, such as when a botnet with thousands of compromised machines overwhelms onion services by initiating millions of introduction requests.

This is fundamentally a DDoS prevention mechanism, not an anti-spam strategy.

In contrast, if (or when?) Nostr relays are flooded with millions of spammy notes per second, one might consider applying a similar PoW-based throttle—e.g., requiring a 20-bit PoW, which takes about one second to compute. This would theoretically reduce the spam rate to thousands of notes per second per spammer node.

Would this actually be effective as an anti-spam?

Interesting. I will search and read about that.

But I don't think you can wait 10 minutes of intensive computing on a smartphone to just send a message - it would make nostr unusable, and onboarding almost impossible.

Yes, it depends on definitions. If you just look strictly to the protocol, it is different, with different principles, and it does not interoperate natively.

Interoperability comes at a different level.

You can say it is different (yes, it is, of course), but in practice they interoperate.

I do not agree that a bridge is a hack. It is a clever piece of software with lot's of design details.

Multiaccount is good for the closed silos of the corp.web - the open web can be better, with messages going through different protocols with bidirectional interoperability

In Tor I don't know how PoW is used.

Bitcoin is different. PoW is the goal of the game of signing a block. Every miner competes to complete the PoW before the others, and the first who completes wins and appends the next block. You cannot move this schema to relays. There is no "competitive game" to publish the next note or anything similar.

From a usability perspective, 60s would be a terrible user-experience design.

And that would not have any significant impact on spammers, that's the point.

Why would it make any difference waiting for 10s, if the spamming server is a dedicated machine? The enrgy cost on the spammer side would be negligible.

Ok, let me make an example.

In the paper the cost is in $, but let's simplify and use time. Let's say that we want a high PoW barrier, like 60s (average) to send an event to Nostr relays using a smartphone. Let's say that the same message costs on a server something like 10s, as the server is more powerful.

So the Nostr user will be pissed ok by waiting 60s to send a message, which will also drain his smartphone batteries.

On the other hand, the dedicated server of the spammer will send 8640 spam messages per day, flooding Nostr relays. And that's assuming the spammer has a single machine, but in reality could be a srvrfarm.

You can reduce the cost and make it even easier for the spammer.

For Tor I am not sure.

Bitcoin is very different: PoW is a competitive game to sign a block, it is not an antispam. There is no parallel to a messaging system.

I disagree on that. Bridges embody the “protocols, not platforms” philosophy, extending the reach of Nostr into the Fediverse. And while it's technically correct that Nostr isn't natively part of the Fediverse (in the sense of speaking ActivityPub), the bridges means that from a user's perspective, Nostr content can flow into and out of the Fediverse ecosystem. That interoperability is more meaningful than theoretical protocol alignment.

It works like that: spammers are going to operate using powerful servers with lots of computing resources and minimal energy constraints—that's the nature of their activity. In contrast, legitimate users often rely on smartphones or low-powered devices.

This creates a fundamental problem for PoW as a spam mitigation strategy: there’s no viable threshold that can effectively hinder spammers without also significantly impairing regular users.

Bitcoin is very different, as its use of PoW is fundamentally different: it’s a competitive system where miners race to solve a game in a winner-takes-all model. That schema does not make sense in a microblogging protocol like Nostr.

Nostr is already part of the Fediverse, thanks to the bridges. And frankly it is one of the best feature it has at the moment.

And Fediverse is about freedom. But technically speaking Mastodon is built on older technology. It lacks certain capabilities that Nostr offers, such as client-side identity, replication, and cryptographic signatures.

That's why Nostr has greater theoretical potential, but this potential has yet to be fully realized in practice.

And Nostr polarized/small userbase is an issue for its growth.