Going back to the good ole CIA security triad (confidentiality, integrity, availability), my view is that #nostr rounds out the integrity part with signed events and the availability part with relays. Most security methodologies focus solely on the confidentiality part - that’s perfectly fine within a command and control context, but in a more decentralized context, integrity and availability have equal importance.

Related Articles