Bitcoin

Nostr Protocol: The Censorship-Resistant Social Network

Nostr applies Bitcoin's censorship-resistance philosophy to social media — a decentralized protocol built on public-key identity, relay architecture, and Lightning integration.

· 14min

In January 2023, Twitter (now X) blocked the sharing of a specific news article. That same year, YouTube deleted hundreds of cryptocurrency-related channels without warning. Facebook restricted anti-government content in Myanmar at the military junta’s request. These incidents share a common thread: billions of users have entrusted their entire social existence to platforms controlled by a handful of corporations.

If Bitcoin achieved money without central banks, Nostr aims to achieve social networking without central servers. Short for “Notes and Other Stuff Transmitted by Relays,” Nostr is a protocol designed to create a communication layer that no one can censor, no one can deplatform you from, and no one can manipulate with algorithms.

Why Nostr Is Necessary

The Reality of Platform Censorship

Social media has become the modern public square. But the keys to that square are held by a few Silicon Valley companies. Twitter blocked sharing of a New York Post article during the 2020 U.S. presidential election and later admitted the decision was wrong. YouTube removed channels covering medical information simply because they diverged from WHO’s official position.

The problem is that censorship operates in one direction. Depending on a platform company’s political leanings, advertiser pressure, or government requests, some voices are amplified while others are silenced. Users have virtually no appeals process. When an account is suspended, the followers, content, and social relationships built over years vanish instantly.

This isn’t a hypothetical concern. It’s the daily reality for journalists, activists, researchers, and ordinary people worldwide who find themselves on the wrong side of a platform’s content policies.

China’s Case: The Completed Form of Surveillance and Control

China’s WeChat is a platform that merges social media, payments, and identity into a single app. The lives of 1.3 billion people depend on it. The government censors all WeChat conversations in real-time, and messages containing sensitive keywords are automatically deleted. Mentioning the date of the Tiananmen Square incident causes your message to simply not be delivered. Linked to the Social Credit System, “inappropriate” speech can restrict your ability to board trains or purchase housing.

This may seem like an extreme case, but the trajectory is the same worldwide. In the United States, Europe, and South Korea, the number of government requests to social media companies for content removal increases every year. The difference is one of degree, not of structure: centralized platforms can always be converted into instruments of control.

The Threat of Deplatforming

In the creator economy, deplatforming is the equivalent of an economic death sentence. When a creator who earns most of their income from YouTube loses their channel overnight, years of accumulated subscribers and content disappear. When a Twitch streamer gets banned, an entire community scatters. This threat induces self-censorship. People begin avoiding certain topics out of fear of losing their accounts.

Bitcoin established the principle of “your keys, your coins” through self-custody. Nostr applies the principle of “your keys, your voice” to social media.

The Philosophical Connection to Bitcoin

Understanding Nostr requires first grasping Bitcoin’s core principles.

Censorship Resistance

No bank or government can block a Bitcoin transaction. A valid transaction that pays the required fee will be included in a block. Nostr works the same way. A message with a valid signature will be relayed by any relay that accepts it. If one relay refuses, another will accept it.

Self-Sovereign Identity

Creating a Bitcoin wallet requires no email address or phone number. Generate a private key, and that is your identity. Nostr applies the identical principle. Your public key (npub) is your identity, and your secret key (nsec) is your access credential. You need no corporation’s approval to participate.

Trustlessness

Bitcoin’s motto is “Don’t trust, verify.” Trust mathematics instead of banks. In Nostr, the authenticity of a message is verified through cryptographic signatures. You don’t need to trust relay operators. If the signature is valid, the message is genuine. If there’s no valid signature, it’s fake.

These three principles — censorship resistance, self-sovereignty, and trustless verification — are the shared roots of Bitcoin and Nostr. If Bitcoin reclaimed the freedom of money, Nostr aims to reclaim the freedom of speech.

Technical Architecture: How Nostr Works

Public/Private Key Identity

Nostr’s account system is remarkably simple. Generate a key pair using the secp256k1 elliptic curve (the same cryptographic system as Bitcoin), and you’re done.

  • Public key (npub): Your public profile address. Anyone can see it.
  • Secret key (nsec): Your private credential that only you should know. You use it to sign messages.

Only someone who possesses the secret key can publish messages under the corresponding public key. If you lose your secret key, there is no way to recover your account — just like losing a Bitcoin wallet’s seed phrase. Freedom comes with responsibility.

NIPs: Nostr Implementation Possibilities

NIPs are Nostr’s standard proposal document system, analogous to Bitcoin’s BIPs (Bitcoin Improvement Proposals). Each NIP defines a specific feature of the protocol.

  • NIP-01: The base protocol. Defines event structure and relay communication methods.
  • NIP-02: Contact List. A list of public keys you follow.
  • NIP-05: DNS-based identifier verification. Verifies identity in the name@domain.com format.
  • NIP-07: Browser extension programs. Securely manages secret keys while interfacing with web clients.
  • NIP-57: Zap. Sending satoshi tips via the Lightning Network.

NIPs can be proposed by anyone and are adopted through community consensus. This open standards process ensures Nostr’s pace of innovation.

Relay Architecture: The Heart of Decentralization

What Is a Relay?

A relay is a server in the Nostr network. But it is fundamentally different from traditional servers. Relays receive, store, and forward user events (messages). The key point is that no single relay controls the entire network.

Relays communicate with clients using the WebSocket protocol (wss://), and relay operators can set their own policies for which events to accept and store. This is similar to the decentralized model of email servers. Just as you can use Proton Mail if Gmail rejects your emails, you can use a different relay if one refuses your messages.

Anyone Can Run a Relay

Relay software is open-source and can run on ordinary computers. The most popular implementations include nostr-rs-relay written in Rust and strfry written in Go. They’re lightweight enough to run on a Raspberry Pi.

This structure guarantees censorship resistance. Even if a government blocks or shuts down a specific relay, users only need to connect to a different one. With thousands of relays distributed worldwide, blocking all of them simultaneously is practically impossible. This is the same principle that makes it impossible to shut down all Bitcoin nodes.

Free relays can be vulnerable to spam. To address this, the paid relay model has emerged. By requiring a small amount of satoshis to post a message, spam becomes economically costly. This mirrors how Bitcoin’s transaction fees prevent network spam.

Additionally, curated relays specialized for specific topics or communities exist. Bitcoin developer-only relays, language-specific content relays, and various other forms are in operation.

The Event Model

In Nostr, all data is represented as a single structure called an “Event.” This is the cornerstone of the protocol’s simplicity.

Event Structure

Every event contains the following fields:

  • id: The unique hash of the event
  • pubkey: The publisher’s public key
  • created_at: Unix timestamp
  • kind: A number indicating the type of event
  • tags: An array of related metadata
  • content: The actual content
  • sig: A digital signature created with the secret key

Major Event Kinds

  • Kind 0 (Profile Metadata): Stores the user’s name, profile picture, and bio in JSON format. Publishing a new Kind 0 event replaces the previous one.
  • Kind 1 (Text Note): A standard post, equivalent to a tweet. There’s no 280-character limit, and some clients support Markdown.
  • Kind 3 (Follow List): A list of public keys you follow. Since this data is managed at the protocol level rather than by any specific client, your follow list persists when you switch clients.
  • Kind 4 (Encrypted Direct Message): Encrypted private messages defined in NIP-04. Only the sender and recipient can decrypt the content.
  • Kind 7 (Reaction): Likes or emoji reactions.
  • Kind 9735 (Zap Receipt): A receipt for satoshi transfers via the Lightning Network.
  • Kind 30023 (Long-form Content): Blog-style long posts that can include metadata like titles, summaries, and images.

On top of this simple event model, a wide variety of applications can be built: social networks, blogs, marketplaces, chat applications, and more. The protocol’s simplicity becomes the foundation for innovation.

Bitcoin Lightning Integration: Zaps and Value for Value

Zaps: Gratitude Denominated in Satoshis

The most powerful integration point between Nostr and Bitcoin is the Zap. Defined in NIP-57, Zaps allow users to send satoshis directly to others via the Lightning Network.

On traditional social media, a “like” provides dopamine but no economic value. Zaps are different. You can send 100 satoshis to someone who wrote a great post. You can send 1,000 satoshis to a developer who shared useful information. These micropayments happen instantly and nearly free through the Lightning Network.

Value for Value (V4V)

V4V is the core economic model of the Nostr ecosystem. Content consumers voluntarily pay an amount proportional to the value they received. This is fundamentally different from the advertising model.

In the advertising model, the user is the product. Platforms sell users’ attention and data to advertisers for revenue. In the V4V model, the content itself is the value, and direct compensation for that value flows through Lightning. No intermediary takes a cut.

The podcast app Fountain is a representative implementation of this model. Listeners can stream a set amount of satoshis per minute while listening to a podcast, or send additional satoshis via a “boost” at particularly good moments.

Major Clients

Nostr is a protocol, not an app. Just as email can be accessed through Gmail, Outlook, Thunderbird, and many other clients, Nostr can be used through a variety of clients.

Damus (iOS)

Released on the Apple App Store in February 2023, Damus brought Nostr to mainstream attention. It features a Twitter-like interface with integrated Lightning Zap functionality. It gained significant attention through Jack Dorsey’s endorsement. However, in June 2023, Apple’s in-app purchase policies led to temporary restrictions on the Zap feature.

Amethyst (Android)

The leading client for Android users. It supports various media formats and excels in relay management. Community features and live streaming (Kind 30311) support are also notable.

Snort / Iris (Web)

Web-based clients accessible through browsers. They allow participation in the Nostr network without installing separate apps. When paired with NIP-07 compatible browser extensions (nos2x, Alby, etc.), users can securely manage their secret keys while using web clients.

Primal

One of the fastest-growing clients in recent times. It features fast loading speeds through a caching service and a built-in Bitcoin wallet. It provides a clean interface that’s accessible to users accustomed to existing social media platforms.

Switching clients doesn’t affect your account (key pair) or follow list. This is the core advantage of a protocol-based network. It’s a completely different experience from losing everything when moving from Twitter to Mastodon.

Key NIPs in Detail

NIP-05: DNS-Based Identity Verification

Public keys are long strings like npub1qy8tz... that are difficult to remember. NIP-05 maps these to internet identifiers in the format alice@example.com.

The mechanism is straightforward. Record a name-to-public-key mapping in JSON at example.com/.well-known/nostr.json, and clients query this to verify identity. It’s similar to Twitter’s blue checkmark, but requires no corporate approval. Anyone who owns a domain can set it up.

NIP-57: Zap Protocol

The technical implementation of Zaps is based on the LNURL-pay protocol. When a user sets a Lightning address (LNURL or Lightning Address) in their profile, other users can send Lightning payments to that address. Upon successful payment, a Kind 9735 event (Zap Receipt) is published to relays, publicly recording who sent how much to whom.

NIP-07: Browser Extensions

Entering your secret key directly into a website is dangerous. NIP-07 standardizes how browser extensions securely store secret keys and use them only when a web client requests a signature. It operates on the same principle as hardware wallets protecting Bitcoin private keys. Notable extensions include nos2x and Alby.

Limitations and Challenges

Nostr isn’t perfect. It’s an innovative protocol, but there are challenges to solve for mainstream adoption.

Spam

Since anyone can create unlimited accounts, spam is structurally easy. Various solutions are being attempted — paid relays, trust-based filtering (Web of Trust), NIP-05 verification — but no complete solution exists yet. Proof-of-Work-based spam prevention (NIP-13), applying Bitcoin’s hashcash concept, is also under discussion.

Efficiently searching for content across the entire network without a centralized indexing service is a technical challenge. Since each relay holds only partial data, comprehensive search requires querying multiple relays simultaneously. Specialized search relays and indexing services are under development to address this.

Key Management Difficulty

If you lose your secret key, there’s no way to recover it. This is the same problem as Bitcoin self-custody. Requiring ordinary users to securely manage cryptographic keys is a high barrier to mass adoption. Solutions like NIP-26 (delegated signing) and social recovery mechanisms are being researched.

Media Storage

Nostr is optimized for transmitting text events. Storing and delivering large media like images and videos requires separate infrastructure. Currently, most media relies on external hosting services (nostr.build, void.cat, etc.), and decentralizing this aspect remains a future challenge.

User Experience

Like Bitcoin in its early days, Nostr’s current user experience is at the early-adopter level. Concepts like public/private keys, relay selection, and Zap setup present entry barriers for non-technical users. Over time, clients are gradually abstracting away this complexity, but there’s still a long way to go.

Bitcoin Maximalism and Nostr

Jack Dorsey’s Role

Jack Dorsey, co-founder and former CEO of Twitter, is Nostr’s most influential patron. In December 2022, he donated 14 BTC (approximately $245,000 at the time) to Nostr development. This wasn’t simple philanthropy. It was both a penance and an alternative proposal from someone who witnessed his own creation, Twitter, devolve into a censorship tool.

Dorsey has stated multiple times that “protocols should replace platforms.” Just as email isn’t beholden to any single company, social media shouldn’t be either. That’s his conviction.

Bitcoiners’ Adoption of Nostr

The Bitcoin community is Nostr’s most active user base. This is no coincidence. Bitcoin’s core values — decentralization, censorship resistance, self-sovereignty — translate directly to Nostr. Many Bitcoin developers, educators, and influencers have either moved their primary activity from Twitter to Nostr or maintain a presence on both.

The reason Bitcoin maximalists support Nostr is clear: the freedom of money is incomplete without the freedom of expression. Bitcoin eliminated financial censorship, but what good is that if talking about Bitcoin itself can be censored?

Conclusion: The Age of Protocols

In the early days of the internet, open protocols like email (SMTP), the web (HTTP), and file transfer (FTP) connected the world. But through the 2010s, closed platforms like Facebook, Twitter, and Instagram took their place. Users’ data, relationships, and identities became trapped in corporate databases.

Nostr is an attempt to reverse this trend. It’s a movement to return social networking to open protocols. It’s still in its early stages, and there are many challenges to solve. But Bitcoin was also an unknown experiment in 2009. What matters isn’t technical maturity but direction.

Nostr is a philosophical extension of Bitcoin. If Bitcoin realized “your keys, your coins,” Nostr aims to realize “your keys, your voice.” Just as Bitcoin transmits value without central bank permission, Nostr transmits ideas without platform permission.

The moment you generate a public key, no corporation can take your voice away. That is Nostr’s promise.

Related