Sovereign Nostr Operations Manual (v1.0)

Protocol, not platform. Event bus, not app.

0. Scope & stance

This manual treats Nostr as:

Non-goals (very important):

Everything below is about using it on those terms.

1. Nostr in one page

1.1 Core model

Nostr (“Notes and Other Stuff Transmitted by Relays”) is an open protocol for decentralized message transmission designed to resist censorship while maintaining session integrity (see the overview on Wikipedia).

Mechanics:

The protocol itself is deliberately minimal — it just defines the messages between clients and relays.

1.2 What Nostr is good at

From the protocol’s own framing and independent overviews:

1.3 What Nostr is not

Protocol-level docs, security write-ups, and NIP DM specs are explicit:

Treat Nostr like a global signed radio, not a confidential messenger.

2. Threat model & personas

Design your usage around personas, not “one account does everything”.

2.1 Persona types

  1. Signal persona (public / loud)
  2. Operator persona (sovereign / controlled)
  3. Ghost persona (high-risk / low-signal)

For each persona, everything that follows (keys, relays, clients, Lightning) must be explicitly specified, not left to defaults.

3. Identities & keys

3.1 Core facts

3.2 Baseline key protocol

For any identity that matters:

3.3 NIP-46 / remote signing baseline

For real identities, NIP-46 (“Nostr Connect”) / remote signing should be treated as baseline, not an optional luxury:

Operational rule: nsec lives in a signer; clients never see it directly, except for short-lived burner identities.

4. Identity binding & correlation (NIP-05, bridges, DID)

4.1 NIP-05 (DNS name ↔ Nostr key)

NIP-05 maps name@domain ↔ npub via a DNS-hosted JSON file and HTTPS. It’s widely promoted to make identities “human readable” (see, for example, the explanation at nostr.co.uk – How Nostr Works and the NIPs list).

Risk:

Guideline:

4.2 Social and app bridges

There are tools and projects mapping:

Result: your Nostr identity does not live in isolation. Default usage tends to bind it into a multi-graph linking DNS, email, social, payments, and DID infrastructure.

Design identities with that in mind.

5. Clients & signers

5.1 Clients are interfaces, not “accounts”

The protocol defines messages; clients are just tools (core spec).

Implications:

5.2 Normie on-ramp vs sovereign setup

Normie path (for onboarding others)

Good references:

These often assume:

This is fine for intro and low-risk usage, not for core sovereign identities.

Sovereign path (for you / operators)

6. Relays & topology

6.1 What relays actually do

Relays:

6.2 Relay zones

Think of three “zones”:

  1. Public Broadcast Zone
  2. Community / Semi-Private Zone
  3. Internal / Lab Zone

6.3 Operational relay policy

Per identity:

Relay defaults from clients are starting points, not gospel.

7. Security & privacy practices

7.1 DM & encryption reality

From NIP-04, NIP-44, and early security write-ups:

Operational rule: use Nostr DMs for low-risk social messaging and contact bootstrap, not for sensitive ops. For high-risk comms, use purpose-built E2EE (Signal, Matrix, off-band) and treat Nostr as the “directory” layer.

7.2 Key & client attacks

Concrete risks highlighted by security practitioners:

Mitigations:

7.3 Known attacks & research

There is an emerging catalog of real-world attacks:

Treat these as required reading for anyone building or operating key infrastructure.

8. Metadata, OSINT, and AI

8.1 Aggregators & dashboards

Sites like nostr.info, nostr.watch, nostr.band, and others:

These tools are dual-use:

8.2 AI & federation

Academic and commercial work already explores Nostr as AI substrate. For example, Fedstr proposes a decentralized marketplace for federated learning and LLM training built on Nostr, with datasets and model updates exchanged via events.

Combined with:

Practical conclusion: assume anything you publish on public relays becomes structured AI training data and searchable knowledge graph content.

Design what you emit accordingly.

9. Lightning, zaps, and value flows

9.1 Why Lightning integration matters

Guides and learning paths emphasize Lightning wallets and “zaps” as central to Nostr’s value-for-value ecosystem (e.g. the Lightning & zaps sections in nostr.how and LearnNostr).

Zaps do three things at once:

9.2 Custodial vs non-custodial

Educational resources like LearnNostr lay out tradeoffs:

Operational rules:

10. Ecosystem maps & learning resources

10.1 High-level overviews (mental model)

Use these to install the protocol model and macro framing:

10.2 Directories & indexes (use as maps, not endorsements)

Treat these as ecosystem indexes you query when you want classes of tools, and as OSINT surfaces that show adversaries the same information.

10.3 Structured learning

LearnNostr provides a guided path from basics to building applications:

Use it as a curriculum for training operators and developers — then layer your threat model on top.

11. Builders: dev & design stack

11.1 Developer tooling

For building clients, relays, agents, or infra:

Guidelines:

11.2 UX & product design

Nostr Design provides principles and patterns for:

Use it to:

For sovereign design:

12. Beyond social: Nostr as event bus

Nostr isn’t just Twitter-but-signed.

Ecosystem catalogs and research describe:

From a systems perspective:

This is where it can become part of a broader sovereign stack — as long as you treat its public nature seriously.

13. Onboarding others (controlled)

For pulling people out of Web2 without misleading them:

Provide a two-stage path:

  1. Stage 1 – Experience
  2. Stage 2 – Sovereignty

14. Re-audit checklist (keep the guide alive)

Revisit these questions regularly (every few months):

  1. New NIPs & governance
  2. Relays & indexes
  3. AI & OSINT
  4. Security
  5. Lightning & regulation
  6. App distribution

Treat this manual as living infrastructure, not dogma. The protocol is simple; the ecosystem, incentives, and threats are not.