Why Nostr? What is Njump?
2024-01-28 04:34:41
in reply to

Custom Designed on Nostr: For censorship resistance, there are several huge threats not really addressed by ...

For censorship resistance, there are several huge threats not really addressed by Nostr: ICANN DNS, cabal TLS, ISP.

Low handing fruit: never ever use ISP nameservers. Run your own resolving DNS server. Do NOT use the ICANN root zone unmodified. Practice adding private TLDs - from the common 'LAN' TLD for local names to secret TLDs that you share only with trusted collaborators to public alt-TLDs (like .NOSTR) that anyone can use by configuring the name servers you supply. Always use your own primary DNS server. Use peers (even competitors) or 3rd party services for secondary service. Note that 3rd party secondary services will only handle ICANN TLDs. Consider becoming a server for the opennic.org collection of alt-TLDs. It is good practice.

Cabal TLS is not secure and never has been. The cabal can forge certs and MITM https and other TLS connections. The problem is that common browsers trust all cabal CAs for all certs. The first step to addressing the problem is a PKCS#11 policy for the browser. I just learned that all browsers are supposed to support that last week (I was working on an extension to "veto" certs via user supplied rules or js code). Normies need a simple way to use private CAs with confidence they will be trusted only for designated domains/TLDs (and that cabal CAs are NOT trusted for those domains/TLDs).

When I started on the internet, we connected peers via rs232 cable, a leased line, or a 24x7 phone call with a dial-up modem. These methods improved, and additional tech like coax, 10baseT, ISDN, Wifi, etc were added. The internet remained decentralized until around 1996, when globalist began pushing for a more centralized approach. Not only ICANN, but convincing people to drop peer connections and just use an ISP, drop self-hosting and just use a service. All this centralization was so convenient. Nicky Haley advocates a national ID to access an ISP. Elites will be pushing for this. It is past time to relearn peer connections.

The best technique IMO is virtual global mesh networks. These support a mix of ISP and peer links and do not rely on the original internet routing (BGP) which required too much manual intervention. The best virtual nets are e2ee with authenticated IPs (IPv6).

IPv4 must die. It has become a tool of centralization. (But you probably have to compromise to accomodate normies until they can install a p2p enabling VPN on their devices.)
Author Public Key
npub1thxca0y6klep9jg8k5gqw6dndwdw4l0caz0j88vhetwhnadp00wqtpjfj3