-

@ Girino Vey!
2025-02-15 18:43:52
Another idea for the nostr protocol, to see if it has any merit: Hide your IP address from relays and people monitoring them.
The idea is to hide the origin of some event from the relays that will redistribute it.
How to achieve it:
Create "router" services that receive gift wrapped events addressed to them, unwrap the event, and repost to content as a new event (content must be a valid, signed event)
you can chain routers to achieve maximum anonymity. (3 to 5 steps should be enough).
how would hat work:
1- create a normal event. Do not post it into any relay.
2- get a list of valid "router" npubs from your preferred relays
3- select N > 1 routers
4- gift wrap the event for the npub of the first relay. Do not post it yet
5- for each remaining router, encrypt the last giftwrapped event and address to it.
6- now you have an event that is giftwrapped N times. Each gift wrapped event is a valid event that can be posted to any relay.
7- you publish the N times gift wrapped event
now the routers:
routers simply receive events addressed to them, unwrapped the event and repost it to a random set of relays (inbox/outbox protocol cand be used here, with each router posting the events to the inbox of the next recipient of the event)
The last router of the list will get a regular event, say a kind 1 event, or kind 4, anything.
routers could wait for a number of events to accumulate before posting them, missing them up so anyone monitoring cannot match inputs and outputs from the router. The routers could also keep sending "fake" events to one another to further shuffle events and make the system more robust.
Anyway, anyone monitoring relays would not be able to match inbound and outbound events, making them untraceable to the origin IP.
What do you think about it? is it useful? Would you use it?
#nostr #asknostr #nostrprotocol #nip