Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Nostr

Nostr is a simple, open protocol for decentralized social networking based on cryptographic key pairs and a global network of relays.
Chainscore © 2026
definition
DECENTRALIZED PROTOCOL

What is Nostr?

Nostr is a decentralized social networking protocol designed to be simple, resilient, and censorship-resistant.

Nostr (Notes and Other Stuff Transmitted by Relays) is an open, decentralized protocol for a global social network, defined by a set of simple, non-proprietary standards. Unlike traditional platforms, Nostr has no central servers, company, or single point of failure. Instead, it operates on a federated model of independent relays and user-controlled cryptographic key pairs. Users publish signed events—such as text notes, reactions, or metadata—to any relays they choose, and clients fetch data from multiple relays to construct a unified feed. This architecture makes the network resilient and resistant to censorship or deplatforming.

The protocol's core components are public-private key pairs and relays. A user's identity is their public key (often shown as an npub1... address), and their private key signs all content, proving authorship. Relays are simple servers that receive, store, and broadcast events from users; anyone can run a relay, and users can publish to or read from as many as they wish. This creates a competitive relay ecosystem and prevents any single entity from controlling the network. The most common client implementation is Damus, but many independent clients exist, all interoperating via the same protocol.

Nostr's design emphasizes simplicity and interoperability. Its specification is intentionally minimal, focusing on a small set of event kinds (like kind:1 for text notes). This allows for rapid client innovation and specialization—from microblogging to long-form articles, direct messaging, and even decentralized identity. A key feature enabled by cryptographic signatures is zaps, which are small Bitcoin Lightning Network payments that can be attached to notes as monetized likes or tips, creating a native value layer without platform intermediaries.

The protocol addresses several limitations of both traditional social media and other decentralized alternatives. Compared to federated networks like ActivityPub (used by Mastodon), Nostr has no concept of a "home server"—a user's data is not tied to a single instance, eliminating migration headaches. Its relay-based model also avoids the complex server-to-server synchronization of federation. While still evolving, Nostr has gained significant traction for its developer-friendly approach, strong censorship resistance, and the vibrant, multi-client ecosystem it fosters.

etymology
NAME ORIGINS

Etymology

The name 'Nostr' is a recursive acronym, a common convention in open-source software, that reveals the protocol's core philosophy and technical foundation.

Nostr is a recursive acronym for "Notes and Other Stuff Transmitted by Relays." This naming convention, where the acronym's first letter refers to the acronym itself, is a hallmark of hacker culture and open-source projects (e.g., GNU's "GNU's Not Unix"). The name immediately signals the protocol's two fundamental components: notes (the decentralized social posts or events) and relays (the simple, distributed servers that broadcast them).

The choice of "Notes" over "messages" or "tweets" is deliberate. It emphasizes simplicity, permanence, and a broader utility beyond mere social media. A note can be a short post, a long-form article, a cryptographic proof, or a structured data event, making the protocol a general-purpose data broadcast system. The term "Relays" evokes a network of independent, non-custodial pass-through servers, contrasting with centralized "servers" or "platforms" that host and control user data.

The etymology underscores Nostr's foundational principles: simplicity in its client-relay model, decentralization through its relay-based architecture, and resilience via its open protocol standard. Unlike branded platforms (Twitter, Facebook), the name describes a function, not a company, aligning with its permissionless, identity-agnostic design where anyone can run a relay or build a client without a central authority.

how-it-works
PROTOCOL OVERVIEW

How Nostr Works

Nostr is a decentralized social networking protocol that operates on a simple, resilient architecture of clients and relays.

The Nostr protocol operates on a simple, decentralized architecture built around two core components: clients and relays. A client is any software application—like a web app, mobile app, or desktop client—that a user interacts with to create, sign, and publish content. A relay is a simple server that receives messages from clients and broadcasts them to other connected clients. Unlike traditional platforms, there is no central server; anyone can run a relay, and users can connect to multiple relays simultaneously for redundancy and censorship resistance. This separation of data storage (relays) from the user interface (clients) is a fundamental design principle.

User identity and data integrity are secured through public-key cryptography. Each user is identified by a public key, which serves as their permanent, self-sovereign identifier (e.g., npub1...). The corresponding private key is kept secret and is used to cryptographically sign every piece of data, or event, the user creates. An event is a JSON object containing the message content, a timestamp, a kind (which defines the event type, like a note or metadata), and the user's signature. Relays store and broadcast these signed events, but they cannot forge them, ensuring the authenticity and integrity of all data on the network.

The protocol defines specific event kinds to structure different types of content. The most common is Kind 1, which is a short text note, the equivalent of a "tweet" or post. Other kinds handle user metadata (Kind 0), encrypted direct messages (Kind 4), reaction emojis (Kind 7), and more. Clients interpret these kinds to render a familiar social media experience. A user's complete social graph and history are not stored in one place but are assembled by their client, which fetches their events and the events of the people they follow from all the relays they are connected to, creating a personalized feed from the decentralized data layer.

key-features
NOSTR PROTOCOL

Key Features

Nostr is a decentralized, open protocol for social networking defined by its core architectural principles. These features enable censorship-resistant, interoperable, and simple communication.

01

Decentralized Identity

User identity is based on a cryptographic keypair, not a central server. A user's public key (e.g., npub1...) is their permanent identifier, while the private key signs all their content. This creates self-sovereign identity that cannot be deplatformed by any single entity.

02

Relay-Based Architecture

The network operates via independent relays—servers that receive, store, and broadcast messages. Users can publish to and subscribe to multiple relays. This design eliminates single points of failure and control, as no relay is authoritative. Users choose relays based on performance, moderation policies, or jurisdiction.

03

Simple Event Format

All data is transmitted as standardized Nostr Events (JSON objects). Each event has a kind (defining its purpose, like a note or metadata), content, and a cryptographic signature. Common kinds include:

  • Kind 1: Short-form text notes (posts).
  • Kind 0: User metadata (profile name, picture).
  • Kind 3: Contact lists and relay recommendations. This simplicity enables client interoperability.
04

Censorship Resistance

Because content is replicated across many independent relays, it is extremely difficult to delete globally. A user banned from one relay can immediately publish the same signed event to others. Censorship requires collusion across a significant portion of the relay network, aligning with the protocol's anti-fragile design goals.

05

Client Diversity & Interoperability

The protocol-client separation allows for a wide ecosystem of Nostr clients (applications). Different clients (e.g., Damus, Amethyst, Coracle) can interact with the same relays and users, offering varied interfaces and features while maintaining network compatibility. This prevents vendor lock-in and fosters innovation.

06

Extensibility (NIPs)

New features are proposed and standardized through Nostr Implementation Possibilities (NIPs). These are similar to Bitcoin's BIPs or Ethereum's EIPs. NIPs allow the protocol to evolve for functionalities like encrypted direct messages (NIP-04), zaps (NIP-57) for Bitcoin Lightning payments, and reactions (NIP-25).

examples
NOSTR

Examples & Ecosystem

Nostr's decentralized architecture has fostered a diverse ecosystem of clients, relays, and applications beyond simple social networking.

03

Zaps (Monetization)

A Zap is a micro-payment sent over the Lightning Network directly associated with a Nostr event (like a post or profile). It is the native monetization primitive.

  • Enabled by the NIP-57 standard.
  • Uses Lightning Addresses or LNURL for seamless payments.
  • Allows users to instantly tip creators or reward valuable content without platform intermediaries taking a cut.
05

Beyond Social: Applications

While known for social media (sometimes called 'Twitter without servers'), Nostr's protocol is general-purpose and supports various applications:

  • Blogging Platforms: Like Blogstack or Habla.news.
  • Marketplaces & Classifieds: Such as Nostr Marketplace initiatives.
  • Encrypted Direct Messaging: Using NIP-04 or NIP-44 for encryption.
  • Decentralized Identity: Public keys serve as portable, self-sovereign identities.
06

Key Management & Signing

User control is centered on cryptographic key pairs. The private key is the user's ultimate identity and must be secured.

  • Nostr Connect (NIP-46): A remote signing protocol that allows apps to request signatures from a user's key stored in a separate, secure client (like a browser extension). This improves security by not exposing keys to web apps.
  • Hardware Signers: Support for signing events with hardware devices like Blockstream Jade or Coldcard via NIP-07 (browser extension) or other methods.
technical-details-nips
NOSTR IMPROVEMENT PROPOSALS

Technical Details: NIPs

NIPs are the formal specification documents that define the standards and extensions for the Nostr protocol, analogous to BIPs in Bitcoin or EIPs in Ethereum.

A Nostr Improvement Proposal (NIP) is a formal design document that introduces new features, standards, or best practices to the decentralized Nostr protocol. Each NIP provides the technical specifications required for interoperability between different clients and relays. The process is community-driven: anyone can propose a NIP by submitting a draft to the official repository, where it undergoes review and discussion before being assigned a number and status (Draft, Final, or Deprecated). This open governance model allows the protocol to evolve without a central authority.

NIPs are categorized by their function. Core NIPs (e.g., NIP-01) define the foundational protocol, including event formats, cryptographic signing, and basic relay behavior. Standard NIPs establish common features like direct messaging (NIP-04), reactions (NIP-25), and replaceable events (NIP-16). Optional NIPs propose experimental or application-specific extensions, such as decentralized identity (NIP-05) or long-form content (NIP-23). This modular structure allows developers to implement only the standards relevant to their application while maintaining a base level of network compatibility.

For developers, implementing NIPs correctly is critical for ensuring their client or relay can communicate with the broader Nostr ecosystem. A client that supports a wider range of NIPs can offer more features, like encrypted chats, profile metadata, or custom event types. Relays may choose which NIPs to support, influencing the types of data they store and broadcast. The canonical list of NIPs serves as the definitive technical reference, and the protocol's evolution is transparently tracked through the acceptance and implementation of these proposals across the network.

security-considerations
NOSTR

Security & Privacy Considerations

Nostr's decentralized architecture presents unique security and privacy trade-offs. These cards detail key considerations for users and relay operators.

01

Key Management & Self-Custody

Nostr uses public-key cryptography where users control their identity via a private key. Self-custody is mandatory, meaning:

  • No account recovery: Lost keys result in permanent identity loss.
  • Key rotation is complex: Changing keys requires signing a new key with the old one and broadcasting it as an event.
  • Device security is critical: Private keys must be stored securely, often in dedicated Nostr clients or hardware signers.
02

Relay Trust & Censorship

Users depend on relays (servers) to broadcast and receive messages. This creates a trust model where:

  • Relays can censor: A relay can refuse to store or broadcast a user's events.
  • Data persistence is not guaranteed: Relays can delete data or go offline.
  • Mitigation via redundancy: Users connect to multiple relays to ensure availability and reduce single points of censorship. Relay lists and paid relays offer different trust and persistence models.
03

Metadata & Network Analysis

While content can be encrypted, metadata is exposed on the public relay network, creating privacy risks:

  • Social graph leakage: Follow lists (kind 3) and interactions are public, allowing network analysis.
  • IP address exposure: Connecting to a relay reveals your IP address to its operator.
  • Timing analysis: Event timestamps can correlate activities. Using NIP-65 (Relay List Metadata) can help obscure the full social graph from any single relay.
04

Content Encryption (NIP-04 & NIP-44)

Nostr supports direct message encryption to protect content, but with important caveats.

  • NIP-04: The original standard uses ECDH and AES-CBC. It is considered deprecated due to cryptographic weaknesses and lack of authentication.
  • NIP-44: The modern standard uses XChaCha20-Poly1305, providing authenticated encryption. It is the current recommended practice.
  • Metadata remains visible: Encryption only hides message content; the sender, receiver, and timestamp are still public on relays.
05

Spam & Sybil Resistance

The permissionless nature of Nostr presents challenges for spam and Sybil attacks.

  • No native cost: Posting events is free, requiring relays to implement their own anti-spam measures (e.g., rate-limiting, proof-of-work).
  • Proof-of-Work (NIP-13): Clients can add computational work to event IDs, making spam more expensive. Relays can require a minimum difficulty.
  • Reputation systems: Emerging solutions use social graphs or paid relays to create economic or social cost for bad actors, as there is no global identity system.
06

Client-Side Security

The security of a user's Nostr experience is largely determined by their client software.

  • Key handling: Clients must securely generate, store, and use private keys without exposing them. Web clients run in a browser's sandbox.
  • Relay integrity: Clients fetch data from relays; a malicious relay could serve false events. Event signatures allow clients to verify authenticity.
  • Update mechanism: Unlike centralized apps, there's no forced client updates, leaving users potentially on vulnerable versions. Trust in client developers is essential.
ARCHITECTURE

Comparison: Nostr vs. Federated Protocols

A technical comparison of the simple, global protocol Nostr against traditional federated models like ActivityPub.

FeatureNostrFederated Model (e.g., Mastodon)

Architectural Model

Decentralized Relay Network

Federated Server Network

Identity & Keys

Self-Sovereign (Public/Private Key Pair)

Data Persistence & Discovery

Ephemeral Relays (User-Selected)

Persistent Home Servers

Censorship Resistance

High (Publish to Many Relays)

Medium (Subject to Server/Instance Rules)

Protocol Complexity

Simple (JSON Events over Websockets)

Complex (ActivityPub, WebFinger, etc.)

Network Join Friction

None (Generate Keys, Connect)

Medium (Choose/Register on a Server)

Data Portability

Full (Take Keys to Any Client/Relay)

Limited (Server Migration Can Be Complex)

Client Diversity & Interop

High (Any Client, Any Relay)

Variable (Client/Server Compatibility Matters)

NOSTR PROTOCOL

Frequently Asked Questions

Essential questions and answers about the Nostr protocol, a decentralized network for social media and other applications.

Nostr (Notes and Other Stuff Transmitted by Relays) is a simple, open protocol for decentralized social networking that is based on cryptographic key pairs and a network of independent relays. It works by having users sign events (like posts or direct messages) with their private keys and publish them to a set of relays they choose; anyone can then fetch these events from relays using the user's public key. There is no central server, company, or token required, making the network resilient, permissionless, and censorship-resistant. Users interact with the network through client applications, which can range from Twitter-like social clients to blogging platforms or marketplace interfaces.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
What is Nostr? | Decentralized Social Protocol | ChainScore Glossary