Go to file
Your Name 9dc7cdacec . 2025-09-21 15:55:59 -04:00
Trash Created kind 12222 2025-09-18 17:18:47 -04:00
nostr_login_lite@a7dceb1156 . 2025-09-21 15:55:59 -04:00
style_guide@111a0631f2 . 2025-09-21 15:55:59 -04:00
web . 2025-09-21 15:55:59 -04:00
.gitignore v0.0.1 2025-09-17 10:03:26 -04:00
.gitmodules . 2025-09-21 15:55:59 -04:00
EXAMPLE.md Created kind 12222 2025-09-18 17:18:47 -04:00
Norman_Stingley.txt v0.0.1 2025-09-17 10:03:26 -04:00
README.md Created kind 12222 2025-09-18 17:18:47 -04:00
SUPs.md . 2025-09-21 15:55:59 -04:00
THROWER.md . 2025-09-21 15:55:59 -04:00
deploy.sh . 2025-09-21 15:55:59 -04:00
super_ball.code-workspace v0.0.1 2025-09-17 10:03:26 -04:00
super_ball.jpg v0.0.1 2025-09-17 10:03:26 -04:00

README.md

Superball

superball

Superball provides Tor-like location privacy for Nostr users. A Superball is a wrapped nostr event, similar to a TOR onion packet, that bounces between nostr relays and Throwers.

A Thrower is a nostr-capable daemon that monitors nostr nodes, looks for superballs posted for them, grabs them, cryptographically unwraps them, rewraps them potentially with padding, then throws the superball to relay(s) that it is instructed to, when it is instructed to.

How It Works

  1. User creates content - Normal signed Nostr event with their real pubkey
  2. Wrap as Superball - Bundle event + routing instructions, encrypt to Thrower daemon
  3. Anonymous bouncing - Superball bounces through multiple Throwers with delays and padding
  4. Final posting - Original event appears on target relay with user's identity but from Thrower's location

Key Features

  • Location Privacy: Hide your network location while preserving your identity
  • Traffic Analysis Resistance: Random delays and size padding prevent correlation
  • Simple Protocol: Uses NIP-44 encryption with new kind 22222 for routing
  • Flexible Routing: Support for multi-hop paths through multiple Throwers
  • Signature Preservation: Original event signatures maintained for authenticity
  • Audit Security: Detect and avoid malicious Throwers through cryptographic verification

Documentation

  • THROWER.md - Rules and behavior for Thrower operators
  • EXAMPLE.md - Complete walkthrough example
  • SUPs.md - Superball Upgrade Proposals

Perfect for journalists, activists, or anyone who needs to protect their physical location while maintaining accountability for their public statements.