mirror of
https://github.com/aljazceru/nostr-how.git
synced 2025-12-17 06:14:25 +01:00
Fix typo in Mastodon
This commit is contained in:
@@ -27,12 +27,15 @@ Possimus saepe veritatis sint nobis et quam eos. Architecto consequatur odit per
|
|||||||
Nostr is a protocol, designed for simplicity, to create a censorship-resistant global social network. Let's unpack that a little:
|
Nostr is a protocol, designed for simplicity, to create a censorship-resistant global social network. Let's unpack that a little:
|
||||||
|
|
||||||
### Simple
|
### Simple
|
||||||
|
|
||||||
The protocol is based on very simple & flexible `Event` objects (which are passed around as plain JSON) and uses standard public-key cryptography for keys & signing. This makes it easy to run relays and build clients and ensures that the protocol can be extended over time.
|
The protocol is based on very simple & flexible `Event` objects (which are passed around as plain JSON) and uses standard public-key cryptography for keys & signing. This makes it easy to run relays and build clients and ensures that the protocol can be extended over time.
|
||||||
|
|
||||||
### Resilient
|
### Resilient
|
||||||
|
|
||||||
Because Nostr doesn't rely on a small number of trusted servers for moving or storing data, it's very resilient. The protocol assumes that relays will disappear and allows users to connect & publish to an arbitrary number of relays that they can change over time.
|
Because Nostr doesn't rely on a small number of trusted servers for moving or storing data, it's very resilient. The protocol assumes that relays will disappear and allows users to connect & publish to an arbitrary number of relays that they can change over time.
|
||||||
|
|
||||||
### Verifiable
|
### Verifiable
|
||||||
|
|
||||||
Because Nostr accounts are based on [public-key cryptography](https://en.wikipedia.org/wiki/Public-key_cryptography) it's easy to verify messages were really sent by the user in question.
|
Because Nostr accounts are based on [public-key cryptography](https://en.wikipedia.org/wiki/Public-key_cryptography) it's easy to verify messages were really sent by the user in question.
|
||||||
|
|
||||||
Like HTTP or TCP-IP, Nostr is a protocol; an open standard upon which anyone can build. Nostr is not an app or service that you sign up for.
|
Like HTTP or TCP-IP, Nostr is a protocol; an open standard upon which anyone can build. Nostr is not an app or service that you sign up for.
|
||||||
@@ -42,13 +45,15 @@ Like HTTP or TCP-IP, Nostr is a protocol; an open standard upon which anyone can
|
|||||||
Social media has developed into a key way information flows around the world. Unfortunately, our current social media systems are broken:
|
Social media has developed into a key way information flows around the world. Unfortunately, our current social media systems are broken:
|
||||||
|
|
||||||
### Big tech social media
|
### Big tech social media
|
||||||
|
|
||||||
1. Uses your attention to sell ads
|
1. Uses your attention to sell ads
|
||||||
1. Uses bizarre techniques to keep you addicted (refer to point 1)
|
1. Uses bizarre techniques to keep you addicted (refer to point 1)
|
||||||
1. Decides what content to show you based on a secret algorithm that you can't inspect or change
|
1. Decides what content to show you based on a secret algorithm that you can't inspect or change
|
||||||
1. Has complete control over who can participate and who is censored
|
1. Has complete control over who can participate and who is censored
|
||||||
1. Is overrun with spam and bots
|
1. Is overrun with spam and bots
|
||||||
|
|
||||||
### Mastadon (and similar)
|
### Mastodon (and similar)
|
||||||
|
|
||||||
1. User identities are attached to domain names which are controlled by third-parties.
|
1. User identities are attached to domain names which are controlled by third-parties.
|
||||||
1. These third-parties can ban you, just like centralized social media platforms. Server owners can also block other servers.
|
1. These third-parties can ban you, just like centralized social media platforms. Server owners can also block other servers.
|
||||||
1. Migration between servers is difficult and can only be accomplished if servers cooperate.
|
1. Migration between servers is difficult and can only be accomplished if servers cooperate.
|
||||||
|
|||||||
Reference in New Issue
Block a user