STAGE 8 • SovStack Integration
Module: Nostr • Identity • Sovereign Communications Nostr as a law machine for keys, speech, coordination, and markets

Nostr, Identity, and Sovereign Communications
as a Law Machine for Speech, Coordination, and Markets

Nostr is not an app. Nostr is a protocol: a minimal grammar where keys authorize acts, events are signed precedents, relays are micro-jurisdictions, and markets are structured conversations settled on Bitcoin.

Axis: key → event → relay → topology → markets Sovereign routing: portability → redundancy → plurality Failure mode: re-centering via defaults + ranking

0. Telos: Communications as Jurisdiction, Not Content

Nostr is not an app. Nostr is a law machine for identity, speech, and markets.

Bitcoin hardens value. Nostr hardens who speaks, what exists, and how nodes coordinate.

Two stacks
  • Synthetic Stack: identity = leased account; speech = revocable database row; markets = corporate API features.
  • Sovereign Stack: identity = keypair; speech = signed events; markets = structured event flows settled on Bitcoin.

Nostr provides the minimal substrate: one core object (the event), one core authority (the private key), a mesh of independent relays, and a small wire protocol for publishing and subscribing. Everything else—feeds, DMs, marketplaces, organizations, city-nodes—is composition.

Orientation: protocol intent + macro framing Primary

fiatjaf — “nostr: Notes and Other Stuff Transmitted by Relays” (design doc)

Spec
Protocol intentMinimalism
Open ↗

nostr-protocol/nostr — protocol repo

GitHub
ReferenceCore objects
Open ↗

Lyn Alden — “The Power of Nostr” (macro synthesis)

Essay
Identity layerPortability
Open ↗

Jameson Lopp — “Why Nostr Matters”

Essay
Censorship modelLimits
Open ↗

1. Core Primitives: Keys, Events, Replaceability, Tags, Filters

1.1 Keys: Identity as Jurisdiction R33 NIP-01

Identity in Nostr is a public key:

  • Private key: sole authority that can sign for that identity.
  • Public key: globally visible anchor; everyone can verify signatures against it.

This is the same structural move as Bitcoin:

  • You do not ask anyone to create an account.
  • You generate a keypair.
  • You prove authority by signing.
Law semantics
Keypair = jurisdiction. The private key is the sovereign; the public key is the record that the sovereign exists.
Signature = execution of law. Each signed event is a binding act attributable to that jurisdiction.
Event stream = case law. The total history of signed events becomes precedent and reputation.

No central authority can revoke the key itself. Others can ignore it, but they cannot make it not exist.

Core protocol grammar (events + messages) Primary

NIP-01 — Basic protocol flow (event structure, REQ/EVENT/EOSE)

NIP
MandatoryWire grammar
Open ↗

NIPs — Nostr Implementation Possibilities (full list)

Spec
Living grammarKinds/NIPs
Open ↗

NIP-19 — bech32-encoded entities (npub/nsec/note, etc.)

NIP
SharingHuman transport
Open ↗

Rhett Reisman — “Nostr Explained Visually for Beginners” (YouTube)

Video
Mental modelBeginner clear
Open ↗

“What is Nostr? — User Guide Presentation” (YouTube)

Video
OnboardingClients/keys
Open ↗

1.2 Event Structure: The Universal Object R33 NIP-01

Every action in Nostr is an event with these fields:

  • id — deterministic hash of the event’s content.
  • pubkey — author’s public key.
  • created_at — unix timestamp.
  • kind — numeric type (text note, profile, contact list, stall, order, etc.).
  • tags — list of lists encoding references and metadata.
  • content — text or serialized payload.
  • sig — signature of id by the author’s private key.

Process:

  1. Client composes the event (fields set except id, sig).
  2. Client serializes selected fields in the specified order.
  3. Hash → id.
  4. Sign idsig.
  5. Send to relays.
Meaning is layered, not enforced
The protocol does not care what content means. “Social post”, “market listing”, “job offer”, “charter”, “vote”, “payment request”: all are events with different semantics.

1.3 Regular, Replaceable, Parameterized Replaceable

Events come in three behavioral classes:

  1. Regular events
    • Immutable history.
    • Many events per (pubkey, kind).
    • Example: text notes, reactions, DMs.
  2. Replaceable events
    • At most one current event per (pubkey, kind).
    • Newer event supersedes older ones.
    • Example: profile metadata (kind 0), contact list (kind 3), relay list (kind 10002 / NIP-65).
  3. Parameterized replaceable events
    • At most one current event per (pubkey, kind, d-tag-value).
    • Used when one key needs many “slots”, each mutable.
    • Example: product listings, stalls, configurations keyed by ["d","<id>"].
Law interpretation
Regular events are immutable case entries (“this act occurred”).
Replaceable events are current statutes/registers (“this is the latest profile / list / policy”).
Parameterized replaceable events are mutable registries indexed by internal IDs.

History and state diverge:

  • History: all events ever signed.
  • Current state: computed by applying replaceability rules across history.
Replaceability, “state over history”, and marketplaces Spec

NIP-16 — Event treatment (ephemeral + replaceable semantics)

NIP
State rulesMoved to NIP-01
Open ↗

NIP-15 — Nostr Marketplace (stalls, products, orders)

NIP
Stalls/productsOrder flow
Open ↗

NIP-65 — Relay List Metadata (outbox/inbox model)

NIP
TopologyWrite/read
Open ↗

NIP-90 — Data Vending Machine (job/request/result markets)

NIP
Task marketsKinds 5000–7000
Open ↗

1.4 Wire Protocol: Messages Between Clients and Relays R33 NIP-01

Clients and relays speak a minimal language (typically over WebSocket):

  • EVENT — client → relay: publish an event; relay may store/forward.
  • REQ — client → relay: start a subscription with filters.
  • EVENT — relay → client: send matching events for a subscription.
  • EOSE — relay → client: end-of-stored-events marker for that subscription.
  • CLOSE — client → relay: terminate a subscription.
  • OK — relay → client: acknowledge or reject an event (with reason).
  • NOTICE — relay → client: informational warnings/errors.
  • AUTH — relay ↔ client: challenge/response for access control.

Everything—feeds, DMs, market streams—is built from these message types plus filters.

AUTH + access control Spec

NIP-42 — Authentication of clients to relays (AUTH)

NIP
Paid relaysGated communities
Open ↗

Edward Snowden & Jack Dorsey — Nostrasia 2023 panel (video)

Panel
CensorshipAuthoritarianism
Open ↗

1.5 Tags: Graph on Top of the Stream R33 NIP-01

Tags are arrays inside an event, e.g.:

["p", "<pubkey>", "<relay_hint>", "<petname>"]
["e", "<event_id>", "<relay_hint>"]
["a", "<kind:pubkey:d>", "<relay_hint>"]
["t", "topic"]
["r", "https://example.com/resource"]

They create the semantic mesh:

  • "p" — reference to a person (identity).
  • "e" — reference to an event (threading).
  • "a" — reference to a coordinate (addressable/parameterized replaceable id).
  • "t" — topics / hashtags.
  • "r" — external resources.

Threads, mentions, follower graphs, product catalogs, markets, organizational structures—everything is tags over events.

1.6 Filters and Subscriptions: View Law R33 NIP-01

A filter describes which events a client asks for:

  • authors (pubkeys), kinds, since/until, ids, tag-filters (#p, #e, #t…), limit.

A REQ message carries one or more filters. The relay returns matching events and emits EOSE when done with stored history.

View law
Whoever controls defaults controls experience. Soft censorship can happen without “banning”: excluding certain kinds, tags, or authors makes them practically invisible. Filters are the law of what can appear.

2. Relays: Micro-Jurisdictions Over a Shared Law

2.1 Relay Role R33 NIP-01

A relay is any server that:

  • Accepts EVENT messages,
  • Enforces its own policy (limits, spam controls, content rules, fees),
  • Stores chosen events,
  • Responds to REQ subscriptions with matching events.

No relay is canonical: no global consensus, no global identity registry, no chain.

Micro-jurisdictions
Each relay applies local law on top of the shared event grammar. “Decentralization” lives or dies in relay diversity and topology.

2.2 Relay Information Documents: Machine-Readable Terms R43 NIP-11

Relays can expose an info document describing:

  • Supported NIPs/kinds/features,
  • Rate/size limits, payment requirements,
  • Operator contact/policy notes.

Clients can use this to discover capabilities and present “terms” to users: “these are the conditions under which this relay will carry your law.”

Relay behavior, types, and ops Primary

NIP-11 — Relay Information Document

NIP
CapabilitiesLimits/fees
Open ↗

Sebastix — “Run a Nostr relay with your own policies”

Guide
Hands-onPolicy configs
Open ↗

The Bitcoin Manual — “5 Types of Nostr Relays”

Essay
TaxonomyEconomics
Open ↗

Wei & Tyson — empirical analysis of Nostr decentralization (arXiv)

Paper
MeasurementsReplication overhead
Open ↗

2.3 User Relay Lists: Where Your Law Lives R39 NIP-65

Identities can publish relay list events (replaceable) that specify:

  • Write relays: where they publish.
  • Read relays: where they expect to receive.

Clients use these lists to route publication (“outbox”) and discovery (“inbox”).

Topology as identity
An identity is not only a key and its history; it also declares a relay topology—the set of micro-jurisdictions where its acts are recorded and visible.

2.4 Relay Economics, AUTH, and Access Control R41 NIP-42 R44 NIP-13

Relays operate under real constraints and can:

  • Remain free/open,
  • Charge for write access or higher QoS,
  • Require AUTH before reads/writes,
  • Require proof-of-work on events,
  • Specialize by topic/geography/community.

AUTH and payment turn relays into explicit economic actors: membership boundaries, logging, and potential surveillance surfaces.

Economic gating + spam deterrence Spec

NIP-13 — Proof of Work (spam deterrence)

NIP
Nonce tagDifficulty
Open ↗

Bitcoin Magazine — “Nostr: Innovation and Human Progress” (cultural framing)

Essay
Free speechInnovation
Open ↗

2.5 Topology and Geo-Legal Reality

Relays exist in physical jurisdictions. A relay in a compliant state can be ordered to block/log/cooperate; a hardened relay can resist, be blocked, or be a honeypot.

Topology is both:

  • Network (latency, redundancy),
  • Legal (which laws apply to the operator).
Relay choice as geo-legal strategy
Relay selection is not only performance tuning. It is jurisdiction selection and attack-surface selection.

2.6 Indexers and Observers: The Third Actor Class

Besides clients and relays, there are indexers:

  • Subscribe to many relays,
  • Store everything,
  • Provide search, analytics, trending, discovery.

Indexers interpret and rank events. A few high-quality indexers can become new centers of power: choke points for discovery and surveillance.


3. Identity, Key Topologies, and Law Semantics

3.1 Key Lifecycle: States of a Jurisdiction

For a sovereign identity, a key moves through states:

  • Generated — sufficient entropy, ideally offline.
  • Active — signing via one or more clients.
  • Delegated — allowing other keys to sign certain acts.
  • Compromised — suspected or confirmed private key loss.
  • Retired — abandoned in favor of a successor.

Meaning is encoded in the event stream that describes lifecycle: replaceable profile changes, relay list changes, delegation statements, compromise statements.

Delegation + remote signing (multi-key practice) Spec

NIP-26 — Delegated Event Signing

NIP
Root key coldDelegated scopes
Open ↗

NIP-46 — Nostr Remote Signing (Nostr Connect)

NIP
Signer separationReduced exposure
Open ↗

Casa — “Hello, Nostr” (key management for org identity)

Ops
Corporate keysOperational reality
Open ↗

YouTube — “WATCH This Before Starting Nostr (Safety & Privacy Tips)”

Video
Onboarding hazardsKey hygiene
Open ↗

3.2 Multi-Key Topologies

Sovereign practice tends toward structured key hierarchies:

  • Root key — rarely used; used to delegate; hardened storage.
  • Agent / organizational keys — projects/nodes/cities; multi-human control via process patterns.
  • Operational keys — daily devices; limited scope; rotated or sacrificed.
  • Disposable / market keys — isolated trades/experiments; minimal linkage.

Supporting mechanisms:

  • Delegation (NIP-26),
  • Remote signing (NIP-46),
  • Encrypted secret formats and careful storage,
  • Explicit authority graphs rather than “one key everywhere.”
Identity as key graph
The jurisdiction is not a single key but a graph of keys with explicit authority relationships (delegation, signing policy, rotation).

3.3 Profiles, DNS, and NIP-05 R50 NIP-05

Profile events (kind 0) are replaceable: name, picture, bio, website, NIP-05 identity, etc.

NIP-05 links name@domain to a pubkey via a JSON file on that domain: “this domain asserts that this pubkey is associated with this name.”

Interpretation:

  • Useful for recognition and domain-level vouching.
  • Not root identity; the pubkey is.
  • DNS is signage/skin, not foundation.
NIP-05 trust boundaries + identity productization Bridge

NIP-05 — Mapping keys to DNS-based identifiers

NIP
name@domainVouching
Open ↗

Block Engineering — “Trust in Nostr NIP-05 Identifiers”

Essay
Trust modelNot verification
Open ↗

Max Webster (Hivemind) — “Nostr is Identity for the Internet” (LinkedIn)

Essay
Identity thesisOpen data
Open ↗

Why Nostr? — curated posts on motivations

Index
Motivation mapWhy it matters
Open ↗

3.4 Deletion, Supersession, and History R51 NIP-09

Two different questions:

  1. Did this event occur?
  2. Is this event current / valid?

At the protocol level:

  • A signed event that has propagated is part of history.
  • Replaceable events supersede earlier ones for constructing current state.
  • Deletion requests are events: “do not show these prior events anymore.”

Relays/clients may honor or ignore deletions/supersession; the protocol guarantees representability and verifiability, not universal forgetting.

Deletion is itself an act
Deletion is an event: a new act where the jurisdiction requests suppression of earlier acts. Supersession is the evolution of current statute.
Deletion + “history vs view” Spec

NIP-09 — Event Deletion Request

NIP
TombstonesRelay discretion
Open ↗

3.5 Bridges: HTTP Auth, DIDs, and Capture Risk

The same key can be used for:

  • Signing Nostr events,
  • Authenticating HTTP requests (signed auth),
  • Anchoring decentralized identifiers (DID-style methods).

This yields a unitary identity across protocols. It also opens new capture planes:

  • Standards bodies/platforms/regulators defining “valid” keys,
  • Compliance metadata, blacklists/whitelists at identity layer.
Where capture happens
Nostr stays simple and agnostic. Capture happens in layers that adopt Nostr keys as global identity primitives and then add policy.

4. Censorship Resistance and Capture Dynamics

4.1 Hard Invariants

Nostr enforces several hard properties:

  • No central chain to censor or fork.
  • No global account registry to revoke.
  • No canonical relay to control.
  • Keys generated without permission.

Censorship can occur at relays/clients/indexers—but no actor can declare a key or event non-existent for the entire mesh.

Minimum persistence condition
If you have your key, can reach at least one relay, and someone can run a client subscribing to it, your speech persists somewhere.

4.2 Soft Capture via Defaults

Soft capture doesn’t break the protocol; it shapes behavior:

  • Clients ship with curated relay lists by default.
  • Most users never change settings.
  • Traffic concentrates; pressure concentrates; surveillance concentrates.

Dominant clients can also hard-code mutes, exclude kinds/tags, or implement invisible ranking systems.

Capture levers
Default relay sets + default filters + default ranking/hiding rules = practical re-centering.

4.3 Filters, Ranking, and View-Shaping

The same flexibility that allows custom views allows manipulation:

  • Filtering makes some keys/tags effectively invisible.
  • Ranking makes others appear dominant.

Neutrality is not guaranteed by the wire format; it is a property of client/indexer choices.

4.4 Spam, PoW, and Economic Gating R44 NIP-13

Open relays invite spam/abuse (flooding, resource exhaustion, DoS). Mitigations include:

  • Proof-of-work (NIP-13),
  • Fees for writing (often sats),
  • Rate limits per key/IP,
  • Moderation policies for abuse.

These produce economic filters: spam becomes expensive. But they can also tilt toward those with resources and toward relays that monetize access at scale.

Adversarial evaluation: what breaks, how it breaks Audit

Kimura et al. — “Practical Attacks on Nostr: Not in The Prophecies” (EuroS&P 2025)

Security
AttacksRelays/clients
Open ↗

Snowden & Dorsey panel (context for censorship + surveillance)

Panel
Threat modelPower
Open ↗

5. Markets Over Nostr: Structured Event Flows

Markets are conversations with structure:

  • “Here is what I offer.”
  • “Here is my intent to buy.”
  • “Here is the agreed price.”
  • “Here is proof of payment.”
  • “Here is fulfillment / dispute / reputation.”

On Nostr, these are events with specific kinds and tags referencing products, orders, and counterparties—settled on Bitcoin/Lightning.

5.1 Marketplace Protocols: Stalls, Products, Orders R38 NIP-15

Patterns typically use:

  • Stall events (parameterized replaceable) — define a merchant shop.
  • Product events (parameterized replaceable) — define items/services.
  • Order events — capture intent and lifecycle.
  • Encrypted DMs — exchange private details.

Front-ends subscribe, render storefronts/carts, and settle via Bitcoin/Lightning. If a specific website disappears, the store persists as events; another client can re-index it.

Core claim
The store is the key and its events, not the web domain.

5.2 P2P Orderbooks: Global Liquidity Over Events

Orderbook protocols standardize events for offers and bids. Any app can subscribe across relays and build aggregated orderbooks for BTC/fiat, BTC/other assets, or goods/services.

No central orderbook server is required: orderbooks are views over an event field, not proprietary databases.

5.3 Wallet Connectivity: Payment as Conversations R52 NIP-47

Wallet-connect over Nostr lets a client talk to a Lightning wallet using encrypted events. The wallet handles invoice generation, payment execution, and status responses.

Tips, zaps, subscriptions, trade settlements, recurring payments—each is just more signed messaging plus Lightning settlement.

Nostr Wallet Connect (NWC) + app collaboration layer Primary

NIP-47 — Nostr Wallet Connect (NWC)

NIP
Wallet bridgeStandardized
Open ↗

Shinobi — “Nostr Wallet Connect: a Bitcoin app collaboration layer”

Essay
Design rationaleCoordination bus
Open ↗

Bitcoin Audible — Read_799 (audio deep dive on NWC)

Podcast
Long formElaboration
Open ↗

Data vending machines repo (NIP-90 kinds registry)

GitHub
Machine marketsTask kinds
Open ↗
Global markets over Nostr (long-form conversation) Podcast

Bitcoin Audible — Chat_83 (Pocket Casts): Decentralizing Global Markets with Nostr

Podcast
DVMsMarket substrate
Open ↗

Bitcoin Audible — Chat_83 (episode page)

Podcast
Show notesLinks
Open ↗

5.4 Reputation, Arbitration, and Disputes

The protocol provides immutable history and referenceability. Reputation can be direct attestations or aggregated scores computed by indexers/clients.

Arbitration can be social (communities/juries) or structured (NIPs encoding escrow/verdict events). Nostr doesn’t force a single system; it provides signed ground truth to build on.

5.5 Threat Surfaces for Markets

Markets over Nostr inherit risks:

  • Surveillance — public order events are indexable; trade graphs can be mapped.
  • Regulation — market relays can be pressured into KYC/blacklists/logging.
  • Fraud — without strong arbitration, P2P trades are trust-heavy; scams target pseudonymous environments.

The protocol doesn’t magically solve these. It exposes them: everything important is signed and referenceable, usable for protection or control.


6. Privacy, Metadata, and Operational Reality

Nostr is censorship resistant, not anonymous by default.

Visible to relays and observers:

  • Pubkeys involved, timestamps,
  • Which relays a client connects to,
  • Network metadata (IP/region) unless obfuscated,
  • NIP-05 domain mappings,
  • Payment correlations if Lightning identifiers are linked to keys.

Encryption protects DM content and secure payloads, but does not hide that a conversation exists, between which keys, roughly when, and through which relays.

Privacy reality: what Nostr does and does not hide Bridge

Bitcoin Magazine — “The Nostr Privacy Paradox (How Nostr Can Improve Bitcoin Privacy)”

Essay
Not anonymousDiscovery layer
Open ↗

NIP-17 — Private DMs (uses NIP-44 encryption + seals/gift wraps)

NIP
DM schemeMetadata mitigation
Open ↗

NIP-44 — Encrypted Payloads (versioned)

NIP
Cipher formatPadding
Open ↗

NIP-04 — Encrypted DM (legacy; unrecommended)

NIP
Deprecated pathHistorical
Open ↗
Operational continuum
Nostr supports a range: fully public reputational identities → carefully partitioned pseudonymous operational keys. Correlation depends on key reuse, NIP-05 exposure, relay choice, and network-layer hygiene.

7. Nostr in the Sovereign Stack

Position Nostr among the other primitives:

  • Bitcoin L1 — final settlement, thermodynamic cost, sacrifice.
  • Lightning — fast payments and streams.
  • Nostr — identity jurisdiction, comms, coordination, market messaging.
  • Storage layers — off-chain content referenced from events.
  • HTTP / DID bridges — negotiated interfaces to legacy web and identity systems.

A sovereign node’s stack looks like:

  1. Generate a keypair (root identity).
  2. Define relay lists and profiles (presence and topology).
  3. Use events for speech, governance, market offers/orders, payments/receipts.
  4. Anchor major economic actions to Bitcoin and Lightning.
  5. Choose carefully when (if ever) to bind keys into broader identity frameworks.
Stack analogy
Keys = nodes. Events = signals. Relays = nerves. Indexers = interpretive cortex (good or bad). Bitcoin = metabolic base layer of value.
Mythic/civilizational framing + incentive warnings Frame

Guy Swann — “The Fruit of the Nostr Tree” (Habla)

Essay
Use-case treeBeyond social
Open ↗

Bitcoin Audible (Podcast Republic) — Read_738 “Fruit of the Nostr Tree”

Podcast
AudioElaboration
Open ↗

Lyn Alden — “Twitter/X Restored” (includes Oslo talk link)

Essay
Capture riskIncentives
Open ↗

Lyn Alden & Jack Dorsey — Oslo Freedom Forum talk (YouTube)

Video
Open sourceDecentralized social
Open ↗

8. Frontiers and Open Questions

Even now, Nostr supports sovereign identities, resilient speech, P2P markets, and large-scale coordination. The unsolved edges are where the next layers emerge:

  • Multi-sig organizational identities and collective keys (beyond “single key = one operator”).
  • Standardized arbitration and dispute resolution event types.
  • Reputation systems that do not collapse into centralized scoring.
  • Default practices for civilizational key architectures (person, clan, node, city).
  • Market structures resistant to fraud and state capture.
  • Client/relay UX that resists soft re-centering and maintains topology diversity.
  • Privacy layers that defend against global adversaries while preserving verifiability.

Nostr does not answer these; it makes them possible.

Offline-first + resilient comms frontier (dual transport) Frontier

WHY2025 — “Building Bitchat” (offline-first + Nostr + MLS)

Talk
Outage resilienceE2E groups
Open ↗

Jack Dorsey — “How Nostr works in 2 minutes”

Video
CompressedNon-technical
Open ↗

9. Compressed Protocol-Law Spec

Protocol-law compression
  • Identity: keypair = jurisdiction; signatures = binding acts.
  • Speech: signed events across relays; no canonical host.
  • State: computed from history via replaceability rules; “current” is an interpretation layer.
  • Relays: micro-jurisdictions; diversity + topology are the decentralization substrate.
  • View law: filters + ranking = reality for that client; defaults are capture levers.
  • Markets: stalls/products/orders/payment conversations; settlement rides Bitcoin/Lightning; indexers are power surfaces.
  • Security: assume hostile relays, hostile indexers, hostile defaults; model attackers; use multi-key graphs + signing separation.
  • Continuity: design for re-indexing, re-clienting, re-routing, and hostile jurisdiction pressure.
One line
Keys as jurisdictions. Events as acts. Relays as micro-states. Markets as emergent grammars over signed conversations. Bitcoin as anchoring value beneath it all.
Diagnostic film + onboarding atlas Media

Max DeMarco — “Social Media is Broken. Can We Fix It?” (Nostr documentary)

Film
Narrative stakesProtocol entry
Open ↗

Ben Wehrman — “Nostr: The Ultimate Beginner’s Resource Collection”

Index
Curated mapMany links
Open ↗
Quarantined finance layer: synthetic overlays on Nostr Red Team

Lnfi Network (formerly NostrAssets) — docs/overview

Docs
TokenizationCapture risk
Open ↗

Lnfi — “NostrSwap upgrades into Nostr Assets Protocol” (Medium)

Article
DeFi overlayAdversarial read
Open ↗

Resource Index

IDs below match the in-lecture reference chips (e.g., R33).

Offline-first frontierFrontier
Quarantined finance overlayRed Team