getting started intermediate ⏱️ 11 minutes

Censorship Resistance on Nostr: How It Works

Understanding how Nostr achieves censorship resistance - architectural design, real-world examples, limitations, and threat modeling.

Updated: 19 January 2025 By Nostr.co.uk

Introduction

Censorship resistance is Nostr’s primary design goal. While privacy, features, and user experience matter, the core purpose is enabling communication that can’t be censored.

This guide explains how Nostr achieves censorship resistance, what it actually means in practice, the limitations, and how to maximize your resistance to censorship.

What is Censorship Resistance?

Defining the Term

Censorship resistance means no single party can prevent you from publishing or accessing content.

Not:

  • ❌ Absolute freedom (legal constraints exist)
  • ❌ No moderation (relays can moderate)
  • ❌ No consequences (reputation systems exist)

But:

  • ✅ No single point of control
  • ✅ No single entity can silence you
  • ✅ Multiple paths to publish/access content
  • ✅ High cost to censor (not impossible, but impractical)

Why It Matters

Traditional Platform Censorship:

Platform Bans:

  • Twitter bans account → Content deleted, followers lost
  • YouTube deletes channel → Years of content gone
  • Facebook suspends account → Can’t access network

Deplatforming:

  • Platform removes you entirely
  • Lose identity, content, audience
  • No recourse, no appeal (or ineffective appeal)
  • Immediate and total

Political/Corporate Censorship:

  • Platforms censor based on corporate interests
  • Government pressure on platforms
  • Advertiser influence on moderation
  • Unclear, inconsistent enforcement

Nostr’s Alternative:

  • No platform to ban you from
  • Your identity can’t be deleted
  • Content distributed across relays
  • Multiple paths to reach audience

How Nostr Achieves Censorship Resistance

1. Cryptographic Identity

The Foundation: You own your identity via private keys.

Traditional Platform:

Account = username@platform.com
Created by platform
Controlled by platform
Can be deleted by platform

Nostr:

Identity = Your public key (npub)
Created by you (generate locally)
Controlled by you (via private key)
Cannot be deleted by anyone

Censorship Resistance:

  • No one can “ban” your public key
  • No platform controls your identity
  • You can always sign events with your key
  • Identity persists regardless of relay cooperation

Attack: Steal/compromise your private key Defense: Secure key management

2. Multiple Relays

The Architecture: Publish to multiple relays simultaneously.

Single Relay (Fragile):

You → Relay A → Readers
  • Relay A bans you → You’re silenced

Multiple Relays (Resilient):

You → Relay A → Some readers
You → Relay B → Some readers
You → Relay C → Some readers
  • Relay A bans you → Still on B and C
  • Relay B shuts down → Still on A and C

Censorship Resistance:

  • To silence you, censor must control all your relays
  • You can add new relays anytime
  • Relays are geographically and politically distributed
  • No single point of failure

Attack: Pressure all relays simultaneously Defense: Use 5-10+ relays, diverse jurisdictions

3. Client Diversity

The Access Layer: Many interchangeable clients.

Platform Model (Twitter):

One client (Twitter app/website)
Controls access to network
Can be blocked/filtered

Nostr Model:

Damus, Amethyst, Snort, Iris, Nostrudel... (15+ clients)
All access same network
Independent development
Interchangeable

Censorship Resistance:

  • Block one client → Users switch to another
  • No app store monopoly (web clients, sideloading)
  • Clients can’t censor (just access protocol)
  • New clients can appear anytime

Attack: Block all clients (difficult, new ones appear) Defense: Multiple clients, web clients (harder to block), open source (forks possible)

4. No Central Authority

The Governance: No organization controls the protocol.

Platform Model:

  • Company decides policies
  • Government can pressure company
  • Advertiser influence
  • Shareholders influence

Nostr Model:

  • Open protocol (NIPs)
  • No company to pressure
  • Relay operators independent
  • Client developers independent
  • No central decision-making

Censorship Resistance:

  • No single entity to compel
  • No corporate headquarters to raid
  • No CEO to threaten
  • No board to lobby

Attack: Regulate relay operators individually Defense: Geographic diversity, jurisdictional arbitrage

Mechanisms of Censorship Resistance

Mechanism 1: Redundancy

Principle: Store content on multiple independent relays.

How It Works:

  1. You post an event
  2. Client sends to 5-10 relays
  3. Each relay stores independently
  4. Readers connect to multiple relays
  5. Deleting from one relay doesn’t affect others

Effectiveness: High

  • Requires coordinated censorship across relays
  • New relays can be added
  • Readers can access from any relay

Limitation: If all your relays censor, content unavailable

Mitigation:

  • Use more relays
  • Diversify relay selection
  • Include relays in different jurisdictions

Mechanism 2: Portable Identity

Principle: Your identity exists independently of any relay.

How It Works:

  1. Your npub is your identity
  2. Any relay can store your events
  3. Any client can access your content
  4. Switching relays doesn’t change identity

Effectiveness: Very High

  • Can’t be “deplatformed” (no platform)
  • Can’t lose identity (you control keys)
  • Can always publish somewhere

Limitation: Relays can refuse to store your events

Mitigation:

  • Use paid relays (less likely to ban paying customers)
  • Run your own relay
  • Use many relays

Mechanism 3: Cryptographic Verification

Principle: Content authenticity verified by signatures, not trust in relays.

How It Works:

  1. You sign events with private key
  2. Anyone can verify signature with your public key
  3. Relays can’t forge or modify events
  4. Tampering breaks signature

Effectiveness: Absolute (cryptographic)

  • Relays can’t change your words
  • Impersonation provably detected
  • Content integrity guaranteed

Limitation: Relays can refuse to store events

Mitigation: Multiple relays (if one refuses, others don’t)

Mechanism 4: Open Protocol

Principle: No permission needed to implement client or relay.

How It Works:

  1. NIPs publicly documented
  2. Anyone can build client/relay
  3. No approval process
  4. No gatekeepers

Effectiveness: High

  • Continuous innovation
  • New relays can appear rapidly
  • Client development can’t be stopped
  • Forks always possible

Limitation: Requires technical skill

Mitigation: Open source, community development

Real-World Censorship Scenarios

Scenario 1: Platform Ban (Twitter-Style)

Threat: You’re banned from Twitter for expressing controversial opinion.

Traditional Platform:

  • Account deleted
  • Content removed
  • Followers lost
  • No recourse

Nostr:

  • Identity unchanged (your npub)
  • Content on relays (if relays agree)
  • Followers still follow your npub
  • Continue posting

Outcome: Censorship resistant ✅

Scenario 2: Relay Ban

Threat: A relay bans you for policy violation.

Nostr Response:

  • Other relays unaffected
  • Add new relay
  • Continue posting
  • Followers on other relays still see you

Example:

  • Relay A bans you
  • You use Relays B, C, D, E, F
  • Impact: Minimal (lost 1 of 6)

Outcome: Censorship resistant ✅

Scenario 3: Widespread Relay Pressure

Threat: Government pressures all major relays in a country.

Nostr Response:

  • Use relays in other countries
  • Use Tor to access blocked relays
  • Run your own relay
  • Use paid relays (harder to pressure)

Example:

  • UK government pressures UK relays
  • Use US, European, Asian relays
  • Geographic diversity protects you

Outcome: Resistant (requires mitigation) ⚠️

Scenario 4: App Store Removal

Threat: Nostr clients removed from App Store (iOS) or Play Store (Android).

Nostr Response:

  • Web clients (Snort, Iris, Primal) - Can’t be blocked easily
  • Android: Sideload APKs (install outside Play Store)
  • iOS: Web clients (harder, but possible)
  • Desktop: Direct downloads

Example:

  • Damus removed from App Store
  • Users use Snort (web) or other clients
  • Android users sideload Amethyst

Outcome: Resistant (web clients hardest to block) ✅

Scenario 5: Internet Censorship (Great Firewall)

Threat: Government blocks access to Nostr relays at network level.

Nostr Response:

  • VPN: Hide relay access
  • Tor: Access .onion relays
  • Relay in-country: Run local relay (if legal)
  • Proxy relays: Disguised traffic

Example:

  • China blocks known relay IPs
  • Users access via Tor
  • Onion relays can’t be easily blocked

Outcome: Difficult but possible with Tor ⚠️

Threat: Court orders relay to delete content or identify users.

Nostr Response:

  • Relay compliance: May delete from that relay
  • Other relays: Unaffected
  • Identity protection: Relays don’t know real identity (just IP, if not using VPN/Tor)
  • Jurisdiction: Use relays outside court’s jurisdiction

Example:

  • UK court orders UK relay to remove content
  • Content remains on non-UK relays
  • Identity protected if using VPN

Outcome: Partially resistant (depends on relay diversity) ⚠️

Limitations of Censorship Resistance

Honesty requires discussing what Nostr can’t do.

Limitation 1: Relay Cooperation Required

Reality: Relays must store your events for others to see them.

If All Relays Refuse:

  • Your events aren’t distributed
  • Followers can’t see content
  • You’re effectively censored

Likelihood: Low (hard to coordinate)

Mitigation:

  • Use many relays
  • Use paid relays (economic incentive to host)
  • Run your own relay (guaranteed hosting)

Limitation 2: Discovery Problem

Reality: Readers must know which relays to check.

If Your Relays Are Niche:

  • Mainstream users won’t find your content
  • Requires relay configuration
  • Network effects reduced

Mitigation:

  • Use some popular relays (for discovery)
  • NIP-65 relay list (publish your relays)
  • Multiple relays (some popular, some niche)

Reality: Illegal content is still illegal.

Nostr Doesn’t Protect From:

  • Legal consequences of illegal speech
  • Law enforcement investigation
  • Court-ordered actions

What It Does:

  • Makes censorship more difficult
  • Removes single point of control
  • Raises cost of censorship

Important: Censorship resistance ≠ legal immunity

Limitation 4: Network-Level Censorship

Reality: Governments can block internet access.

Great Firewall Scenario:

  • Block relay IP addresses
  • DPI (Deep Packet Inspection)
  • Block Tor (difficult but attempted)

Effectiveness: Nostr helps, but not foolproof

Mitigation:

  • Tor (strong but not perfect)
  • VPNs (easier but weaker)
  • Steganography (hide Nostr traffic)
  • Mesh networks (future possibility)

Limitation 5: Economic Censorship

Reality: Running relays costs money.

Attack Vector:

  • DDoS attacks make relays expensive
  • Legal liability increases costs
  • Regulatory compliance costs

Impact: Free relays shut down, paid relays raise prices

Mitigation:

  • Community-supported relays
  • Paid relays (sustainable model)
  • Personal relays (minimal cost)

Maximizing Your Censorship Resistance

Strategy 1: Relay Diversification

Recommendation: Use 5-10 relays

Diversify Across:

Geography:

  • US relays
  • European relays
  • Asian relays
  • Avoids single jurisdiction

Relay Type:

  • Public relays (accessibility)
  • Paid relays (sustainability)
  • Personal relay (guaranteed hosting)

Operator Type:

  • Individual operators
  • Organizations
  • Anonymous operators

Example Configuration:

  1. relay.damus.io (US, public, popular)
  2. nostr.wine (paid, reliable)
  3. nos.lol (community, public)
  4. relay.snort.social (Europe, public)
  5. your-relay.com (personal, if running own)

Strategy 2: Run Your Own Relay

Why:

  • Guaranteed hosting of your content
  • Complete control
  • No one can ban you

Cost: $5-20/month (VPS)

Complexity: Medium (technical setup required)

Benefits:

  • Your content always available
  • Backup of everything you post
  • Can host for family/friends

See: Running a Relay Guide (future)

Strategy 3: Use Privacy Tools

VPN/Tor:

  • Hide relay connections from ISP
  • Bypass geographic blocks
  • Access blocked relays

Onion Relays:

  • Tor hidden services
  • Maximum censorship resistance
  • Harder to block

Trade-off: Speed (Tor is slower)

Strategy 4: Publish Relay List (NIP-65)

Purpose: Tell followers where to find you.

How:

  • Most clients publish kind:10002 event
  • Lists your preferred relays
  • Followers know where to read your content

Benefit: Discovery even if default relays differ

Strategy 5: Multiple Identities

Use Case: High-risk speech

Strategy:

  • Separate identities for different purposes
  • Pseudonymous identity for controversial speech
  • Main identity for mainstream content

Trade-off: Fragmented reputation

See: Privacy Guide

Strategy 6: Paid Relays

Why: Economic alignment

Logic:

  • You’re a paying customer
  • Relay has financial incentive to host you
  • Less likely to ban arbitrarily

Cost: £3-10/month typically

Benefit: More stable, reliable hosting

Censorship Resistance vs. Other Goals

Censorship Resistance vs. Privacy

Different Goals:

  • Censorship resistance: Can’t be silenced
  • Privacy: Can’t be identified

Can Conflict:

  • Censorship resistance requires publicity (others must see content)
  • Privacy requires secrecy

Nostr’s Priority: Censorship resistance first, privacy optional

For Privacy: Use Tor, VPN, pseudonyms (see Privacy Guide)

Censorship Resistance vs. Moderation

Tension:

  • Censorship resistance enables all speech
  • Moderation restricts some speech

Nostr’s Approach:

  • Relays can moderate (their servers, their rules)
  • Users choose relays (vote with feet)
  • No global moderation
  • Competitive moderation

Result: Both exist, user chooses

Censorship Resistance vs. User Experience

Trade-off:

  • Strong censorship resistance requires redundancy (multiple relays)
  • Multiple relays increase complexity
  • May reduce user experience

Nostr’s Choice: Prioritize censorship resistance, improve UX over time

UK Context: Censorship Resistance and the Online Safety Act

The Regulatory Environment

Online Safety Act 2023:

  • Regulates “platforms” with UK users
  • Imposes content moderation duties
  • Fines for non-compliance
  • Pressure to remove “harmful” content

How Nostr Responds

No Platform to Regulate:

  • Nostr is a protocol, not a platform
  • No central entity to compel
  • No company to fine

Relay-Level Regulation:

  • UK-based relays may face compliance pressure
  • Can regulate individual relays
  • Cannot regulate global network

User Response:

  • Use relays outside UK jurisdiction
  • Your identity and content globally distributed
  • UK can’t “ban” your npub

Practical Impact:

  • UK users can access global Nostr network
  • UK regulatory pressure limited to UK relays
  • Diversify relays (some outside UK)

This is structural censorship resistance.

Ethical Considerations

With Great Power…

Censorship resistance is powerful and can be misused.

Nostr Enables:

  • Free expression for dissidents
  • Whistleblowing
  • Controversial (but legal) speech
  • Minority viewpoints

But Also:

  • Harassment (though relay moderation helps)
  • Misinformation
  • Offensive content

The Trade-off:

  • Enable good speech → Also enable bad speech
  • Censor bad speech → Also censor good speech

Nostr’s Philosophy: Better to enable speech, use other mechanisms (reputation, relay choice, blocking) for handling bad content.

Responsibility

Censorship resistance ≠ No consequences

You’re Still Responsible For:

  • Legal compliance
  • Reputation impact
  • Social consequences
  • Relay policies

Nostr Removes:

  • Platform censorship
  • Arbitrary deplatforming
  • Single-point control

Nostr Doesn’t Remove:

  • Legal accountability
  • Social norms
  • Community moderation

Use responsibly.

Conclusion

Censorship resistance is Nostr’s reason for existing. It’s achieved through architectural design: cryptographic identity, relay redundancy, client diversity, and no central authority.

Key Takeaways:

  1. Cryptographic identity: No one can delete your npub
  2. Multiple relays: No single point of failure
  3. Client diversity: Access can’t be blocked easily
  4. Open protocol: Can’t stop implementation
  5. Limitations exist: Not perfect, but high resistance
  6. Trade-offs matter: Complexity vs. protection

Practical Reality:

Nostr makes censorship difficult and expensive, not impossible. A determined state actor with full internet control could censor, but:

  • Requires significant resources
  • Tor provides additional protection
  • Personal relays guarantee hosting
  • Cost is much higher than censoring Twitter

For Most Censorship Threats: Nostr provides strong protection.

The Bigger Picture:

In a world of increasing deplatforming, corporate censorship, and regulatory pressure on platforms, Nostr offers an alternative architecture that makes censorship structurally difficult.

Not because it’s unmoderated (relays can moderate).

Not because it’s lawless (laws still apply).

But because no single entity controls the network.

That’s censorship resistance.

Further Resources

Remember: Censorship resistance is a spectrum. Nostr provides strong structural resistance, but requires active effort (relay diversity, privacy tools) to maximize. 🔓