导航栏

Home

  • wss://relay.damus.io
  • wss://nostr-pub.wellorder.net
  • wss://nostr.mom
  • wss://nostr.slothy.win
  • wss://relay.stoner.com
  • wss://nostr.einundzwanzig.space
  • wss://nos.lol
  • wss://relay.nostr.band
  • wss://no.str.cr
  • wss://nostr-relay.schnitzel.world
  • wss://relay.nostr.com.au
  • wss://knostr.neutrine.com
  • wss://nostr.nodeofsven.com
  • wss://nostr.vulpem.com
  • wss://nostr-verif.slothy.win
  • wss://relay.lexingtonbitcoin.org
  • wss://nostr-1.nbo.angani.co
  • wss://relay.wellorder.net
  • wss://nostr.easydns.ca
  • wss://relay.dwadziesciajeden.pl
  • wss://relay.orangepill.dev
  • wss://e.nos.lol
  • wss://ragnar-relay.com
  • wss://nostr.data.haus
  • wss://nostr.wine
  • wss://nostr.koning-degraaf.nl
  • wss://nostr.thank.eu
  • wss://relay.hamnet.io
  • wss://nostr.sidnlabs.nl
  • wss://nostr.inosta.cc
  • wss://nostr21.com
  • wss://nostr.ch3n2k.com
  • wss://relay.nostrview.com
  • wss://relay.nostromo.social
  • wss://offchain.pub
  • wss://relay.nostr.wirednet.jp
  • wss://nostr.l00p.org
  • wss://lightningrelay.com
  • wss://bitcoinmaximalists.online
  • wss://private.red.gb.net
  • wss://relay.nostrid.com
  • wss://relay.nostrcheck.me
  • wss://nostrelay.yeghro.site
  • wss://nostrue.com
  • wss://nostr.topeth.info
  • wss://nostr.bitcoiner.social
  • wss://nostr.spaceshell.xyz
  • wss://nostr.roundrockbitcoiners.com
  • wss://relay.nostrology.org
  • wss://nostr-dev.wellorder.net
  • wss://relay.snort.social
  • wss://nr.yay.so
  • wss://nostr.lu.ke
  • wss://atlas.nostr.land
  • wss://nostr.pjv.me
  • wss://brb.io
  • wss://eden.nostr.land
  • wss://nostr-verified.wellorder.net
  • wss://nostr.noones.com
  • wss://relay.nostr.nu
  • wss://nostr-relay.bitcoin.ninja
  • wss://paid.no.str.cr
  • wss://freespeech.casa
  • wss://bitcoiner.social
  • wss://nostr.1f52b.xyz
  • wss://nostr.sebastix.dev
  • wss://nostr.cizmar.net
  • wss://n.wingu.se
  • wss://nostr.bitcoinplebs.de
  • wss://nostr.corebreach.com
  • wss://nostr.tools.global.id
  • wss://xmr.usenostr.org
  • wss://at.nostrworks.com
  • wss://nostr.sovbit.host
  • wss://nostr.1sat.org
  • wss://mastodon.cloud/api/v1/streaming
  • wss://nostr.256k1.dev
  • wss://relay.beta.fogtype.com
  • wss://rsslay.ch3n2k.com
  • wss://relay.nostr.bg
  • wss://nostr.primz.org
  • wss://relay.johnnyasantos.com
  • wss://btc.klendazu.com
  • wss://slick.mjex.me
  • wss://nostr.yael.at
  • wss://nostr.lorentz.is
  • wss://relay.nostrified.org
  • wss://nostr.orangepill.dev
  • wss://relay.primal.net
  • wss://nostr.cercatrova.me
  • wss://nostr.swiss-enigma.ch
  • wss://nostr-relay.derekross.me
  • wss://puravida.nostr.land
  • wss://nostr.sectiontwo.org
  • wss://nostr.oxtr.dev
  • wss://relay.s3x.social
  • wss://relay.ryzizub.com
  • wss://nostr.liberty.fans
  • wss://nostr.frostr.xyz
  • wss://nostr.ginuerzh.xyz
  • wss://nostr.d11n.net
  • wss://nostr.semisol.dev
  • wss://misskey.io
  • wss://nostr.namek.link
  • wss://nostr.gruntwerk.org
  • wss://relay.nostr.wf
  • wss://nostr.land
  • wss://relay.mostr.pub
  • wss://relay.nostrplebs.com
  • wss://purplepag.es
  • wss://yestr.me
  • wss://relay.nostr.ai
  • wss://paid.nostrified.org
  • wss://nostr-02.dorafactory.org
  • wss://nostr.zbd.gg
  • wss://relay.hodl.ar
  • wss://relay.nostr.sc
  • wss://feeds.nostr.band/nostrhispano
  • wss://nostr.middling.mydns.jp
  • wss://nostr.portemonero.com
  • wss://search.nos.today
  • wss://relay.minds.com/nostr/v1/ws
  • wss://welcome.nostr.wine
  • wss://yabu.me
  • wss://nrelay.c-stellar.net
  • wss://nostrja-kari.heguro.com
  • wss://nostr-relay.app
  • wss://rly.nostrkid.com
  • wss://nostr.filmweb.pl
  • wss://relay.utxo.one
  • wss://nostr.strits.dk
  • wss://relay.poster.place
  • wss://nostr.mining.sc
  • wss://nostr.xmr.rocks
  • wss://ithurtswhenip.ee
  • wss://powrelay.xyz
  • wss://relay.vanderwarker.family
  • wss://wc1.current.ninja
  • wss://nostr.ingwie.me
  • wss://nostr.gleeze.com
  • wss://relay.nostrify.io
  • wss://relay2.nostrchat.io
  • wss://relay1.nostrchat.io
  • wss://relay.devstr.org
  • wss://relay.nostr.hu
  • wss://nostr.hifish.org
  • wss://nostr2.sanhauf.com
  • wss://nostrja-kari-nip50.heguro.com
  • wss://nostr.rikmeijer.nl
  • wss://nostrua.com
  • wss://relay.nsecbunker.com
  • wss://nostr.hekster.org
  • wss://nostr.schorsch.fans
  • wss://nostr.reelnetwork.eu
  • wss://nostr.hexhex.online
  • wss://relay.wavlake.com
  • wss://relay.nostr.lighting
  • wss://nostr.sagaciousd.com
  • wss://nostr.fbxl.net
  • wss://multiplextr.coracle.social
  • wss://nostril.cam
  • wss://nostr.btc-library.com
  • wss://relay.getalby.com/v1
  • wss://rss.nos.social
  • wss://nostr.overmind.lol
  • wss://relay.nostrcn.com
  • wss://nostr-01.yakihonne.com
  • wss://nostr.fort-btc.club
  • wss://relay.bitcoinpark.com
  • wss://nostr01.counterclockwise.io
  • wss://relap.orzv.workers.dev
  • wss://christpill.nostr1.com
  • wss://relay.verified-nostr.com
  • wss://nostr.sathoarder.com
  • wss://wbc.nostr1.com
  • wss://nostr.is-defs.fun
  • wss://nostr.heliodex.cf
  • wss://nostr.4liberty.one
  • wss://f7z.io
  • wss://relay.casualcrypto.date
  • wss://relay.notmandatory.org
  • wss://fiatjaf.com
  • wss://relay.despera.space
  • wss://bitstack.app
  • wss://nostr-relay.psfoundation.info
  • wss://purplerelay.com
  • wss://relay.orangepill.ovh
  • wss://nostr.rubberdoll.cc
  • wss://relay.ingwie.me
  • wss://soloco.nl
  • wss://nostr.dlsouza.lol
  • wss://relay.kamp.site
  • wss://nostr.heavyrubberslave.com
  • wss://relay.keychat.io
  • wss://relay.froth.zone
  • wss://nostr.bitcoinist.org
  • wss://nostr.cloud.vinney.xyz
  • wss://relay.momostr.pink
  • wss://nosdrive.app/relay
  • wss://nostrrelay.win
  • wss://nostr.8777.ch
  • wss://unhostedwallet.com
  • wss://21ideas.nostr1.com
  • wss://nostr.stakey.net
  • wss://nostr.sats.li
  • wss://relay.guggero.org
  • wss://relay.noswhere.com
  • wss://unostr.site
  • wss://pyramid.fiatjaf.com
  • wss://frens.nostr1.com
  • wss://creatr.nostr.wine
  • wss://140.f7z.io
  • wss://a.nos.lol
  • wss://directory.yabu.me
  • wss://hist.nostr.land
  • wss://nostr.dodge.me.uk
  • wss://privateisland.club
  • wss://relay.weloveit.info
  • wss://relay.magiccity.live
  • wss://nostr.notribe.net
  • wss://relay.westernbtc.com
  • wss://relay.siamstr.com
  • wss://groups.0xchat.com
  • wss://theforest.nostr1.com
  • wss://problematic.network
  • wss://us.purplerelay.com
  • wss://nostr1.daedaluslabs.io
  • wss://relay.noderunners.network
  • wss://relay.azzamo.net
  • wss://bevo.nostr1.com
  • wss://freelay.sovbit.host
  • wss://relay.sebdev.io
  • wss://inbox.nostr.wine
  • wss://ditto.puhcho.me/relay
  • wss://nostr.t-rg.ws
  • wss://multiplexer.huszonegy.world
  • wss://nostr.huszonegy.world
  • wss://nostr.jcloud.es
  • wss://nostr.thurk.org
  • wss://dev-relay.kube.b-n.space
  • wss://relay.nos.social
  • wss://ditto.slothy.win/relay
  • wss://nostr.hashi.sbs
  • wss://paid.relay.vanderwarker.family
  • wss://nostr.javi.space
  • wss://gleasonator.dev/relay
  • wss://bucket.coracle.social
  • wss://relay.nsec.app
  • wss://relay.sepiropht.me
  • wss://nostr.kungfu-g.rip
  • wss://hotrightnow.nostr1.com
  • wss://relay.artx.market
  • wss://nfrelay.app
  • wss://relay.notoshi.win
  • wss://relay.highlighter.com
  • wss://relay.geyser.fund
  • wss://relay.minibits.cash
  • wss://nostr.petrkr.net/strfry
  • wss://n.ok0.org
  • wss://greensoul.space
  • wss://nostr-02.yakihonne.com
  • wss://nostr-03.dorafactory.org
  • wss://vitor.nostr1.com
  • wss://relay.lax1dude.net
  • wss://relay.zhoushen929.com
  • wss://relay.oke.minds.io/nostr/v1/ws
  • wss://strfry.corebreach.com
  • wss://relay.bitdevs.tw
  • wss://nostr.btczh.tw
  • wss://nostrich.adagio.tw
  • wss://nostr.zoel.network
  • wss://nostr.lifeonbtc.xyz
  • wss://nostr.se7enz.com
  • wss://thecitadel.nostr1.com
  • wss://mleku.nostr1.com
  • wss://nostr2.daedaluslabs.io
  • wss://fiatjaf.nostr1.com
  • wss://nostr.daedaluslabs.io
  • wss://xmr.ithurtswhenip.ee
  • wss://cellar.nostr.wine
  • wss://rkgk.moe
  • wss://nostr.self-determined.de
  • wss://nostr.gerbils.online
  • wss://jingle.carlos-cdb.top
  • wss://carlos-cdb.top
  • wss://bostr.online
  • wss://relays.diggoo.com
  • wss://jp.purplerelay.com
  • wss://ir.purplerelay.com
  • wss://me.purplerelay.com
  • wss://nostr.0x7e.xyz
  • wss://nostr.reckless.dev
  • wss://relay.nostr.net
  • wss://relay.fountain.fm
  • wss://v1250.planz.io/nostr
  • wss://relay.13room.space
  • wss://relay.usefusion.ai
  • wss://ae.purplerelay.com
  • wss://njump.me
  • wss://au.purplerelay.com
  • wss://in.purplerelay.com
  • wss://nosflare.plebes.fans
  • wss://nostr.at
  • wss://bostr.bitcointxoko.com
  • wss://nostria.space
  • wss://nostr.searx.is
  • wss://test.nfrelay.app
  • wss://relay.fanfares.io
  • wss://relay.varke.eu
  • wss://relay.nostr.jabber.ch
  • wss://relay.nostpy.lol
  • wss://relay.camelus.app
  • wss://nostr.myshosholoza.co.za
  • wss://nostr.ussenterprise.xyz
  • wss://nostr.dbtc.link
  • wss://ftp.halifax.rwth-aachen.de/nostr
  • wss://tw.purplerelay.com
  • wss://eu.purplerelay.com
  • wss://relay.benthecarman.com
  • wss://fabian.nostr1.com
  • wss://staging.yabu.me
  • wss://nostr.dmgd.monster
  • wss://testnet.plebnet.dev/nostrrelay/1
  • wss://hivetalk.nostr1.com
  • wss://relay.lawallet.ar
  • wss://relay.piazza.today
  • wss://relay.pleb.to
  • wss://orangepiller.org
  • wss://nostr.lopp.social
  • wss://ch.purplerelay.com
  • wss://loli.church
  • wss://adre.su
  • wss://misskey.04.si
  • wss://cache2.primal.net/v1
  • wss://relay.sincensura.org
  • wss://relay.moinsen.com
  • wss://relay.freeplace.nl
  • wss://cache1.primal.net/v1
  • wss://nostr.openordex.org
  • wss://rly.bopln.com
  • wss://relay.0v0.social
  • wss://nostr.psychoet.nexus
  • wss://relay.nostrr.de
  • wss://us.nostr.land
  • wss://srtrelay.c-stellar.net
  • wss://lnbits.papersats.io/nostrclient/api/v1/relay
  • wss://strfry.chatbett.de
  • wss://relay.nquiz.io
  • wss://nostr.plantroon.com
  • wss://nostr.jfischer.org
  • wss://relay.corpum.com
  • wss://relay.bostr.online
  • wss://lunchbox.sandwich.farm
  • wss://nr.rosano.ca
  • wss://nostr.happytavern.co
  • wss://novoa.nagoya
  • wss://misskey.takehi.to
  • wss://relay.satoshidnc.com
  • wss://nostr.novacisko.cz
  • wss://nsrelay.assilvestrar.club
  • wss://nostr.atitlan.io
  • wss://relay.livefreebtc.dev
  • wss://nostr.tavux.tech
  • wss://nostr.girino.org
  • wss://merrcurrup.railway.app
  • wss://nostr-dev.zbd.gg
  • wss://submarin.online
  • wss://social.camph.net
  • wss://relay.nostrich.cc
  • wss://relay.lumina.rocks
  • wss://profiles.nostr1.com
  • wss://rebelbase.social/relay
  • wss://support.nostr1.com
  • wss://relay.dev.bdw.to
  • wss://ca.purplerelay.com
  • wss://nostr.bitcoinvn.io
  • wss://auth.nostr1.com
  • wss://custom.fiatjaf.com
  • wss://hub.nostr-relay.app
  • wss://nostr.babyshark.win
  • wss://echo.websocket.org
  • wss://nostr.kosmos.org
  • wss://polnostr.xyz
  • wss://relay.refinery.coracle.tools
  • wss://user.kindpag.es
  • wss://nostr.hashbang.nl
  • wss://czas.live
  • wss://chorus.pjv.me
  • wss://relay.agorist.space
  • wss://bostr.cx.ms
  • wss://relay.nostrhub.fr
  • wss://groups.fiatjaf.com
  • wss://hodlbod.coracle.tools
  • wss://hk.purplerelay.com
  • wss://lnbits.satoshibox.io/nostrclient/api/v1/relay
  • wss://relay.cosmicbolt.net
  • wss://nostr.drafted.pro
  • wss://nostr.a2x.pub
  • wss://bostr.lightningspore.com
  • wss://nostr.intrepid18.com
  • wss://de.purplerelay.com
  • wss://obiurgator.thewhall.com
  • wss://nostr.madco.me
  • wss://relay.braydon.com
  • wss://nostr-relay.algotech.io
  • wss://relay.unknown.cloud
  • wss://relay.gems.xyz
  • wss://longhorn.bgp.rodeo
  • wss://notes.miguelalmodo.com
  • wss://onlynotes.lol
  • wss://relay.tagayasu.xyz
  • wss://relay.zone667.com
  • wss://nostr-relay.sn-media.com
  • wss://relay.mostro.network
  • wss://nostr.polyserv.xyz
  • wss://n3r.xyz
  • wss://relay5.bitransfer.org
  • wss://brisceaux.com
  • wss://nostr.faust.duckdns.org
  • wss://satellite.hzrd149.com
  • wss://gnost.faust.duckdns.org
  • wss://relay.jerseyplebs.com
  • wss://nostr.cxplay.org
  • wss://nostr.polonkai.eu
  • wss://libretechsystems.nostr1.com
  • wss://nostr.pailakapo.com
  • wss://relay.alex71btc.com
  • wss://cfrelay.puhcho.workers.dev
  • wss://kiwibuilders.nostr21.net
  • wss://nostr3.daedaluslabs.io
  • wss://relay1.xfire.to:
  • wss://nostr.brackrat.com
  • wss://relay.satlantis.io
  • wss://relay.test.nquiz.io
  • wss://relay.illuminodes.com
  • wss://relay.arrakis.lat
  • wss://cfrelay.haorendashu.workers.dev
  • wss://core.btcmap.org/nostrrelay/relay
  • wss://junxingwang.org
  • wss://relay2.angor.io
  • wss://relaypag.es
  • wss://nostr.skitso.business
  • wss://history.nostr.watch
  • wss://relay.oh-happy-day.xyz
  • wss://invillage-outvillage.com
  • wss://nostr-relay.cbrx.io
  • wss://tigs.nostr1.com
  • wss://misskey.design
  • wss://relay.nostrainsley.coracle.tools
  • wss://relay.cxplay.org
  • wss://relay.angor.io
  • wss://nostr.tbai.me:592
  • wss://strfry.iris.to
  • wss://orangesync.tech
  • wss://nostr.chaima.info
  • wss://relay.minibolt.info
  • wss://jingle.nostrver.se
  • wss://kr.purplerelay.com
  • wss://fl.purplerelay.com
  • wss://relay.chontit.win
  • wss://nostr.bilthon.dev
  • wss://relay.vengeful.eu
  • wss://dtonon.nostr1.com
  • wss://relay.gasteazi.net
  • wss://us.nostr.wine
  • wss://frjosh.nostr1.com
  • wss://relay.staging.geyser.fund
  • wss://nostr.yuhr.org
  • wss://relay.mattybs.lol
  • wss://sushi.ski
  • wss://relay.unsupervised.online
  • wss://nostr.bit4use.com
  • wss://prl.plus
  • wss://news.nos.social
  • wss://airchat.nostr1.com
  • wss://nortis.nostr1.com
  • wss://adeptus.cwharton.com
  • wss://relay.mycelium.social
  • wss://node.coincreek.com/nostrclient/api/v1/relay
  • wss://nostr2.girino.org
  • wss://relay.s-w.art
  • wss://nerostr.girino.org
  • wss://uk.purplerelay.com
  • wss://bostr.erechorse.com
  • wss://eostagram.com
  • wss://relay.coinos.io
  • wss://sendit.nosflare.com
  • wss://relay.nostraddress.com
  • wss://nostrelites.org
  • wss://wot.nostr.party
  • wss://wot.utxo.one
  • wss://haven.cyberhornet.net
  • wss://relay.customkeys.de
  • wss://relay.groups.nip29.com
  • wss://relay29.notoshi.win
  • wss://nostr.2h2o.io
  • wss://relay.nostriot.com
  • wss://relay.lem0n.cc
  • wss://relay.b1t.beer
  • wss://rocky.nostr1.com
  • wss://wot.sovbit.host
  • wss://relay.sovereign.app
  • wss://zap.watch
  • wss://zorrelay.libretechsystems.xyz
  • wss://sorrelay.libretechsystems.xyz
  • wss://mailbox.mw.leastauthority.com/v1
  • wss://memrelay.girino.org
  • wss://relay.lnfi.network
  • wss://wot.girino.org
  • wss://labour.fiatjaf.com
  • wss://wot.codingarena.top
  • wss://relay.nostrdice.com
  • wss://nostr.azzamo.net
  • wss://wot.azzamo.net
  • wss://wot.nostr.sats4.life
  • wss://wot.nostr.net
  • wss://api.freefrom.space/v1/ws
  • wss://wheat.happytavern.co
  • wss://chorus.bonsai.com
  • wss://strfry.bonsai.com
  • wss://wot.sebastix.social
  • wss://inner.sebastix.social
  • wss://haven.accioly.social
  • wss://relay.notestack.com
  • wss://relay.sigit.io
  • wss://satsage.xyz
  • wss://nostr.noderunners.network
  • wss://chronicle.puhcho.me
  • wss://haven.puhcho.me
  • wss://haven.calva.dev/inbox
  • wss://dergigi.nostr1.com
  • wss://wons.calva.dev
  • wss://thebarn.nostr1.com
  • wss://nostr.grooveix.com
  • wss://relay.rodbishop.nz/inbox
  • wss://travis-shears-nostr-relay-v2.fly.dev
  • wss://nostr.sprovoost.nl
  • wss://nostr.x0f.org
  • wss://bostr.syobon.net
  • wss://art.nostrfreaks.com
  • wss://cobrafuma.com/relay
  • wss://alru07.nostr1.com
  • wss://relay.nostrfreedom.net/outbox
  • wss://aplaceinthesun.nostr1.com
  • wss://relay.flirtingwithbitcoin.com
  • wss://plebone.nostr1.com
  • wss://cfrelay.snowcait.workers.dev
  • wss://thewritingdesk.nostr1.com
  • wss://relay.botev.sv
  • wss://relay.degmods.com
  • wss://seth.nostr1.com
  • wss://untreu.me
  • wss://agentorange.nostr1.com
  • wss://reimagine.nostr1.com
  • wss://nostr.takasaki.dev
  • wss://nostr.coincrowd.fund
  • wss://bnc.netsec.vip
  • wss://nostr.community.ath.cx
  • wss://nostr.cltrrd.us
  • wss://relay.xeble.me
  • wss://no.netsec.vip
  • wss://strfry.shock.network
  • wss://relay.8333.space
  • wss://relay02.lnfi.network
  • wss://relay.lightning.gdn
  • wss://nostr.cypherpunk.today
  • wss://relay.nostrfreaks.com
  • wss://relay.shuymn.me
  • wss://haven.eternal.gdn
  • wss://cyberspace.nostr1.com
  • wss://nostr-rs-relay.dev.fedibtc.com
  • wss://relay.das.casa
  • wss://ursin.nostr1.com
  • wss://monitorlizard.nostr1.com
  • wss://wot.shaving.kiwi
  • wss://relay.cyphernomad.com
  • wss://nostr.extrabits.io
  • wss://relay.jellyfish.land
  • wss://wot.tealeaf.dev
  • wss://chorus.tealeaf.dev
  • wss://haven.tealeaf.dev/inbox
  • wss://h.codingarena.top/inbox
  • wss://relay.goodmorningbitcoin.com
  • wss://wot.zacoos.com
  • wss://relay.shawnyeager.com/chat
  • wss://proxy0.siamstr.com
  • wss://articles.layer3.news
  • wss://relay.hs.vc
  • wss://chronicle.dtonon.com
  • wss://wot.dtonon.com
  • wss://relay.stens.dev
  • wss://social.protest.net/relay
  • wss://relay.patrickulrich.com/inbox
  • wss://relay.davidebtc.me
  • wss://relay.dev.ntech.it
  • wss://chronicle.dev.ntech.it
  • wss://nostr.bitpunk.fm
  • wss://lnvoltz.com/nostrrelay/n49jzjytb
  • wss://ghost.dolu.dev
  • wss://thebarn.nostrfreaks.com
  • wss://niel.nostr1.com
  • wss://adoringcardinal1.lnbits.com/nostrrelay/test-relay
  • wss://nostr.thebiglake.org
  • wss://wot.relay.vanderwarker.family
  • wss://haven.girino.org
  • wss://pow.hzrd149.com
  • wss://nostr-news.nostr1.com
  • wss://thewildhustle.nostr1.com
  • wss://nostr.sats.coffee
  • wss://dikaios1517.nostr1.com
  • wss://nostr4.daedaluslabs.io
  • wss://relay.calders.us
  • wss://nostr.mikoshi.de
  • wss://relay.nuts.cash
  • wss://brightlights.nostr1.com
  • wss://darknights.nostr1.com
  • wss://relay.chrisatmachine.com
  • wss://nostr.agentcampfire.com
  • wss://nostr.me/relay
  • wss://relay.nostr.watch
  • wss://dwebcamp.nos.social
  • wss://nostr.1312.media
  • wss://nostr.phauna.org
  • wss://henhouse.social/relay
  • wss://nostr.neilalexander.dev
  • wss://nip13.girino.org
  • wss://tijl.xyz
  • wss://relay.rengel.org
  • wss://relay.stewlab.win
  • wss://relay.badgr.digital
  • wss://relay.crbl.io
  • wss://rl.baud.one
  • wss://relay.axeldolce.xyz
  • wss://nip85.nostr.band
  • wss://antisocial.nostr1.com
  • wss://relay.isphere.lol
  • wss://cl4.tnix.dev
  • wss://nostr.dl3.dedyn.io
  • wss://nostr.camalolo.com
  • wss://hayloo.nostr1.com
  • wss://nostr.schneimi.de
  • wss://wostr.hexhex.online
  • wss://pareto.nostr1.com
  • wss://nostr.pareto.space
  • wss://relay.utih.net
  • wss://relay.lifpay.me
  • wss://david.nostr1.com
  • wss://haven.ciori.net
  • wss://bonifatius.nostr1.com
  • wss://pay.thefockinfury.wtf/nostrrelay/1
  • wss://relay.xplbzx.uk
  • wss://nostr.tac.lol
  • wss://btcpay2.nisaba.solutions/nostr
  • wss://relay.bitcoinschool.nl
  • wss://dev-relay.lnfi.network
  • wss://relay.netstr.io
  • wss://freespeech.social/relay
  • wss://straylight.cafe/relay
  • wss://nostr-relay01.redscrypt.org:48443
  • wss://relay.devvul.com
  • wss://relay.bitcoinveneto.org
  • wss://relay.shop21.dk
  • wss://nostr.mtrj.cz
  • wss://relay.jthecodemonkey.xyz
  • wss://devapi.freefrom.space/v1/ws
  • wss://aaa-api.freefrom.space/v1/ws
  • wss://nostr.rosenbaum.se
  • wss://fido-news.z7.ai
  • wss://stratum.libretechsystems.xyz
  • wss://tamby.mjex.me
  • wss://nostr.cottongin.xyz
  • wss://wot.eminence.gdn
  • wss://hi.myvoiceourstory.org
  • wss://nostr.red5d.dev
  • wss://relay-testnet.k8s.layer3.news
  • wss://nostr.pistaum.com
  • wss://relay-nwc.rizful.com/v1
  • wss://nostrum.satoshinakamoto.win
  • wss://eupo43gj24.execute-api.us-east-1.amazonaws.com/test
  • wss://backup.keychat.io
  • wss://relay.openbalance.app
  • wss://nostr.jonmartins.com
  • wss://social.proxymana.net
  • wss://nostr-pr02.redscrypt.org
  • wss://nostr-pr03.redscrypt.org
  • wss://nostrelay.memory-art.xyz
  • wss://promenade.fiatjaf.com
  • wss://inbox.azzamo.net
  • wss://premium.primal.net
  • wss://nostr.timegate.co
  • wss://team-relay.pareto.space
  • wss://relay.dariccoin.me
  • wss://relay.dannymorabito.com/inbox
  • wss://nostr.lojong.info
  • wss://relay.transtoad.com
  • wss://cfrelay.royalgarter.workers.dev
  • wss://nostr-rs-relay-ishosta.phamthanh.me
  • wss://nostr.rblb.it:7777
  • wss://fiatrevelation.nostr1.com
  • wss://sources.nostr1.com
  • wss://nostr-pr04.redscrypt.org
  • wss://relay.nostronautti.fi
  • wss://moonboi.nostrfreaks.com
  • wss://mats-techno-gnome-ca.trycloudflare.com
  • wss://nostr.d3id.xyz/relay
  • wss://nostr.holbrook.no
  • wss://logen.btcforplebs.com
  • wss://relay.nostrtalk.org
  • wss://community.proxymana.net
  • wss://misskey.gothloli.club
  • wss://mleku.realy.lol
  • wss://relay.maiqr.app
  • wss://relay.tv-base.com
  • wss://relay.rkus.se
  • wss://relay.snotr.nl:49999
  • wss://relay.brightbolt.net/inbox
  • wss://magic.nostr1.com
  • wss://null.spdns.eu
  • wss://nostr.itdestro.cc
  • wss://nostrrelay.taylorperron.com
  • wss://nostr.tegila.com.br
  • wss://stage.mosavi.xyz/v1/ws
  • wss://eclipse.pub/relay
  • wss://relay.asthroughfire.com
  • wss://relay.nostrarabia.com
  • wss://news.utxo.one
  • wss://relay.stream.labs.h3.se
  • wss://mls.akdeniz.edu.tr/nostr
  • wss://asia.azzamo.net
  • wss://tollbooth.stens.dev
  • wss://nostrelay.yeghro.com
  • wss://nostrich.zonemix.tech
  • wss://relay.chakany.systems
  • wss://45.135.180.104
  • wss://relay.mwaters.net
  • wss://kitchen.zap.cooking
  • wss://basedpotato.nostr1.com
  • wss://nostr1.jpegslangah.com
  • wss://primus.nostr1.com
  • wss://wot.mwaters.net
  • wss://prod.mosavi.io/v1/ws
  • wss://bots.utxo.one
  • wss://nostr.caramboo.com
  • wss://9yo.punipoka.pink
  • wss://nostr.trepechov.com
  • wss://stg.nostpy.lol
  • wss://nostr.ovia.to
  • wss://riley.timegate.co
  • wss://willow.timegate.co
  • wss://relay.olas.app
  • wss://social.olsentribe.fyi
  • wss://relay.arx-ccn.com
  • wss://zaplab.nostr1.com
  • wss://hax.reliefcloud.com
  • wss://nostrrelay.blocktree.cc
  • wss://hole.v0l.io
  • wss://nostr.phuture.sk
  • wss://cc3d.nostr1.com
  • wss://coop.nostr1.com
  • wss://synalysis.nostr1.com
  • wss://nostr.luisschwab.net
  • wss://relay.fr13nd5.com
  • wss://relay.nostrfy.io
  • wss://relay.vaporware.network
  • wss://relay.mzm.app
  • wss://nostr.felixzieger.de
  • wss://nostr.spicyz.io
  • wss://relay.pre-alfa.iz-collaborator.com
  • wss://bunker.vanderwarker.family
  • wss://ltgnetwork.nostr1.com
  • wss://relay.bullishbounty.com
  • wss://dev.coracle.tools
  • wss://relay04.lnfi.network
  • wss://jellyfish.land
  • wss://relay03.lnfi.network
  • wss://rtson.onrender.com
  • wss://nostr.1sat.store
  • wss://v2.fly.dev
  • wss://communities.nos.social
  • wss://vidono.apps.slidestr.net
  • wss://nostrboss.com
  • wss://aegis.utxo.one
  • wss://data.relay.vanderwarker.family
  • wss://relay.marc26z.com
  • wss://relay-dev.netstr.io
  • wss://relay.danieldaquino.me
  • wss://aegis.relayted.de
  • wss://relay.nostrverified.fyi
  • wss://n.posto.us.kg
  • wss://relay.hook.cafe
  • wss://aegis.relaynostr.xyz
  • wss://nostrapps.com
  • wss://nostr.douglascruz.com.br
  • wss://wot.relayted.de
  • wss://inbox.mycelium.social
  • wss://relay.d11n.net
  • wss://haven.relayted.de
  • wss://free.relayted.de
  • wss://relay.zapstore.dev
  • wss://chat.mihhdu.org
  • wss://bridge.duozhutuan.com
  • wss://relay.evanverma.com
  • wss://relay.nostrdvm.com
  • wss://nostr.joomaen.top
  • wss://nostr.235421.xyz
  • wss://nostr.bitcoinsult.de
  • wss://nostrelay.circum.space
  • wss://relay1.plor.dev
  • wss://relayrs.notoshi.win
  • wss://fenrir-s.notoshi.win
  • wss://bostr.azzamo.net
  • wss://nos.zct-mrl.com
  • wss://skeme.vanderwarker.family
  • @ f296e355:c28d00bc
    2023-08-03 08:31:44

    The history of codes and cryptography is a fascinating topic that spans thousands of years and involves many different methods and technologies. I have wanted to write on this topic for quite some time now but couldn’t complete it due to other projects at hand. Many people on individual basis and even companies use cryptographic techniques for various reasons from protecting sensitive data and preventing espionage to enabling the creation and exchange of cryptocurrency and other digital assets. But many people have little to no idea about the evolution of codes and cryptographic systems. In this piece, we shall briefly overview some of the main phases and milestones in the development of cryptology, the science of making and breaking codes.

    image Photo by cottonbro studio from Pexels

    Feel free to read all my articles on the anti-censorship long content platform yakihonne


    Ancient Ciphers and Early Encryption Techniques

    Ancient ciphers and early encryption techniques are methods of transforming messages or information in such a way that only authorized parties can access them. They usually involve replacing or rearranging the letters or symbols of the original message with a secret key or algorithm. Here are some examples of ancient ciphers and early encryption techniques:

    The Caesar Shift Cipher

    The Caesar cipher, employed by Julius Caesar and his army during the 1st century BC, served as a means to encrypt military and official messages. Operating as a simple substitution cipher, it involved replacing each letter in the message with another letter positioned a fixed number of places away in the alphabet. For instance, with a shift of 3, ‘A’ would be substituted with ‘D’, ‘B’ with ‘E’, and so forth. The key for this cipher represented the number of positions to shift, encompassing values ranging from 1 to 25. To decipher the message, the recipient needed knowledge of the key to revert the letters to their original positions. However, the Caesar cipher was susceptible to frequency analysis, a method involving the tabulation of letter occurrences in the ciphertext and comparing them against the expected frequencies in the language, thus rendering it relatively easy to break.

    The Scytale Cipher

    The Spartans and other ancient Greeks utilized a cipher during the 7th century BC for the encryption of military and political messages. This particular cipher operated as a transposition cipher, whereby the arrangement of letters in the message was altered based on a concealed pattern. The pattern, in this case, was determined through the utilization of a cylindrical rod known as a scytale. To encrypt the message, the sender would encircle a strip of parchment or leather around the scytale and proceed to inscribe the message along its length. Subsequently, the strip would be unwrapped and dispatched to the intended recipient. For decryption, the recipient would require a scytale possessing an identical diameter to rewrap the strip around it and decipher the concealed message. This cipher’s security was compromised, as its vulnerability lay in attempting various diameters of rods until the message became intelligible, rendering it relatively easy to break.

    The Steganography

    Steganography, distinct from a cipher, represents a technique employed to conceal messages in plain sight by disguising them as something else. Its origins can be traced back to ancient times, and it has found utility across a range of endeavors encompassing espionage, propaganda, and art. Several examples of steganography include inscribing a message on a shaved head, allowing the hair to regrow and obscure the hidden text, utilizing invisible ink or microdots to convey information, and embedding messages within different mediums, such as texts, images, audio, or video files. If executed adeptly, steganography can prove challenging to detect; nevertheless, it can be exposed through meticulous scrutiny or by subjecting the medium to careful examination or analysis.


    The Renaissance and Early Modern Cryptography

    The Renaissance and early modern period witnessed a flourishing of cryptography as a result of political, religious, and scientific developments. Cryptography became more sophisticated, diverse, and widespread, as well as more subject to cryptanalysis and code-breaking. Here are some aspects and examples of cryptography in this era:

    The rise of diplomatic cryptography

    During the Renaissance, a notable transformation occurred in the realm of diplomacy, paving the way for the establishment of a modern system characterized by permanent embassies, the formulation of international law, and multilateral negotiations among autonomous states. Given the crucial need for secure communication between ambassadors and their respective home governments, as well as among allies and adversaries, the significance of cryptography as an indispensable tool for diplomats became apparent. Cryptography served a dual purpose, enabling diplomats to safeguard their confidential information while simultaneously providing a means to engage in covert intelligence gathering, influencing public sentiment, and monitoring their rivals’ activities. As diplomatic relations evolved, cryptography emerged as an essential component in the arsenal of tools employed by diplomats to navigate the intricate web of international affairs during the Renaissance.

    Here’re a few examples of diplomatic cryptography are:

    • The Vigenère cipher, a polyalphabetic substitution cipher that was considered unbreakable for centuries. It was invented by Giovan Battista Bellaso in 1553 and improved by Blaise de Vigenère in 1586. It was widely used by European diplomats until the 19th century.
    • The Babington Plot, a conspiracy to assassinate Queen Elizabeth I of England and replace her with Mary, Queen of Scots in 1586. The plot was exposed by Sir Francis Walsingham, Elizabeth’s spymaster, who intercepted and deciphered the letters between the plotters using a nomenclator, a combination of symbols and code words.
    • The Great Cipher, a complex substitution cipher that was used by the kings of France from Louis XIV to Louis XVI. It was invented by Antoine and Bonaventure Rossignol in 1645 and remained unsolved until 1890.

    image One component of a customary nomenclator employed during the era of Louis XIV, 1690. Wikimedia Commons Public Domain Image.

    The role of cryptography in religion and science during the Renaissance

    Within the backdrop of the Renaissance, a period characterized by profound intellectual and societal transformations, religious conflicts like the Protestant Reformation and the Catholic Counter-Reformation took center stage. Simultaneously, the era bore witness to groundbreaking scientific advancements and methodologies, including the revolutionary Copernican heliocentric model and the Baconian induction. In the middle of these developments, cryptography emerged as a significant factor influencing both religious and scientific domains. Cryptography served as a means to express dissent, preserve orthodoxy, and facilitate the clandestine transmission of knowledge. Furthermore, it became a subject of scholarly inquiry and experimentation for esteemed scholars and natural philosophers of the time. Cryptography thus acquired a dual role, influencing and being influenced by the intellectual currents that shaped the Renaissance era.

    Some examples of cryptography in religion and science are:

    • The Trithemius cipher, a progressive polyalphabetic substitution cipher that was invented by Johannes Trithemius, a German abbot and occultist, in 1508. It was disguised as a book on magic called Steganographia, which claimed to teach how to communicate with angels using hidden messages in texts.
    • The Baconian cipher, a biliteral substitution cipher that was devised by Francis Bacon, an English philosopher and scientist, in 1605. It used two different typefaces or fonts to encode messages within other texts. Bacon also proposed a method of hiding messages in musical notes or knots.
    • The Newtonian cipher, a numerical substitution cipher that was used by Isaac Newton, an English physicist and mathematician, to encrypt his private notes on alchemy and theology. He assigned numbers to the letters of the alphabet according to their order or frequency and wrote them in groups of five.

    image Photo by K. Mitch Hodge on Unsplash


    The Enigma Machine and World War II

    The Enigma machine and World War II are closely related, as the Enigma was a cipher machine used by Nazi Germany to encrypt and decrypt messages for military and diplomatic purposes. The Enigma was considered to be very secure and reliable, but it was eventually broken by the Allies, who used the intelligence gained from reading the German messages to gain an advantage in the war.

    The Enigma machine

    The Enigma machine, conceived by German engineer Arthur Scherbius in 1918 and patented in 1923, emerged as a remarkable electro-mechanical apparatus consisting of several components. Comprising a keyboard, lampboard, plugboard, and a set of rotors, it enabled the encryption and decryption of messages.

    image Photo by Christian Lendl on Unsplash

    Users would input plaintext or ciphertext through the keyboard, and the corresponding encrypted or decrypted letters would be displayed on the lampboard. The plugboard facilitated additional permutations of letters, while the rotors, altered with each keystroke, modified the electrical connections between the keyboard and lampboard. The Enigma machine boasted an extensive array of potential settings, rendering the key challenging to guess or crack via brute-force methods. These settings involved the selection and order of rotors, initial rotor positions, and the plugboard configuration. To maintain security, these settings were altered daily or even more frequently, using secret key lists that were distributed to operators in advance. Although initially intended for commercial purposes, the Enigma machine swiftly gained traction among various military and government entities worldwide, most notably the Nazi regime in Germany, who employed it extensively before and during World War II.

    World War II

    World War II, a global conflict spanning from 1939 to 1945, witnessed the engagement of two opposing alliances: the Axis powers and the Allied powers. The devastating war led to vast casualties, widespread destruction, and profound socio-political transformations.

    Cryptography played a pivotal role during this period as both sides employed various encryption and decryption techniques to secure their communications and gather intelligence on their adversaries.

    Among these methods, the Enigma machine held paramount importance for Nazi Germany, serving as a device to encode critical messages across all branches of the German military. The initial breakthrough in cracking the Enigma code came in 1932 when Polish mathematicians developed techniques and machines to decipher it. They subsequently shared their achievements with British and French intelligence prior to the outbreak of the war. In 1939, Britain established the clandestine code-breaking unit Ultra at Bletchley Park, led by mathematician Alan Turing and a team of experts. Building upon the Polish methods, they refined decryption processes and devised new machines, such as the Bombe, to decipher Enigma messages on a larger scale. The successful decryption of the Enigma code provided the Allies with a pivotal advantage in numerous battles and campaigns, including the Battle of Britain, the Battle of the Atlantic, and the pivotal D-Day invasion. It also allowed for vigilant monitoring of German movements, plans, and intentions. Estimates from historians suggest that the breaking of the Enigma code potentially shortened the war by two to four years, resulting in the preservation of millions of lives.

    image Photo by Mauro Sbicego on Unsplash

    The Digital Age and Public-Key Cryptography

    The digital age and public-key cryptography are interrelated, as the advent of digital technologies and the internet created new challenges and opportunities for cryptography.

    Public-key cryptography, aka asymmetric cryptography, is a cryptographic field that employs a pair of interconnected keys, namely a public key and a private key, for the purpose of encrypting and decrypting messages.

    Public-key cryptography revolutionized the field by allowing secure communication between parties who have no prior knowledge or trust of each other, using mathematical techniques such as asymmetric encryption and digital signatures.

    The digital age

    The digital age is the period of history characterized by the widespread use of digital technologies, such as computers, the internet, mobile devices, and social media. The digital age began in the late 20th century and continues to the present day. This age has brought many benefits and challenges for cryptography. On one hand, it has enabled faster, cheaper, and more accessible encryption and decryption of data, as well as new applications and domains for cryptography, such as e-commerce, online banking, cloud computing, cryptocurrency, and blockchain.

    On the other hand, it has also increased the risks and threats of cyberattacks, hacking, surveillance, identity theft, and data breaches. It has also increased the demand and complexity of cryptography. As more data is generated, stored, transmitted, and processed online, there is a greater need for protecting its confidentiality, integrity, authenticity, and availability. As more users and devices are connected to the internet, there is a greater challenge for distributing and managing cryptographic keys securely.

    Public-key cryptography

    Public-key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman in their seminal paper “New Directions in Cryptography”. They proposed a method of key exchange that allowed two parties to establish a shared secret key over an insecure channel without any prior communication or trust. This method is known as the Diffie-Hellman key exchange.

    This type of cryptography that uses pairs of related keys:

    a public key that can be openly distributed without compromising security, and

    a private key that should be kept under secrecy by the owner of the key

    The keys are generated with cryptographic algorithms based on mathematical problems called one-way functions, which are easy to compute in one direction but hard to reverse.

    Public-key cryptography has two main functions: encryption and digital signatures. Encryption is the process of transforming a message into an unreadable form using a key. Digital signatures are the process of creating a unique code that can verify the identity of the sender and the integrity of the message using a key. Anyone with a public key can encrypt a message for a specific recipient who has the corresponding private key. The decryption of the message can only be performed by the intended recipient using their private key.

    Consider this example, Alice can send Bob an encrypted message using Bob’s public key that only Bob can decrypt with his private key. In public-key digital signatures, anyone with a private key can sign a message with their private key to create a signature. The authenticity of the signature and its association with the signer can be verified by anyone possessing the corresponding public key and confirming if it matches the message. For example, Alice can sign a message with her private key to create a signature that Bob can verify with Alice’s public key.

    This type of cryptography was further developed by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1977 when they created the RSA algorithm, which is one of the most widely used public-key encryption and digital signature schemes today. RSA stands for Rivest-Shamir-Adleman, the initials of its inventors.

    image Ronald Rivest, Adi Shamir, & Leonard Adleman, 1977. Photographed by: Unknown. Source: National Cryptographic Foundation

    Quantum Cryptography: A New Era of Encryption

    A new era of encryption phrase that describes the use of quantum physics to create and secure cryptographic systems that are theoretically immune to conventional attacks.

    Quantum cryptography exploits the properties of quantum mechanics, such as superposition, entanglement, and uncertainty, to perform tasks that are impossible or infeasible with classical cryptography.

    Quantum key distribution

    Quantum key distribution (QKD) stands as the most extensively explored and implemented approach within the realm of quantum cryptography. Serving as a technique, QKD enables two parties, commonly referred to as Alice and Bob, to establish a shared secret key over an insecure communication channel, including fiber-optic cables or free space, devoid of any prior communication or established trust. QKD capitalizes on the principle that quantum states, such as photons, cannot be replicated or measured without perturbation. Thus, any potential eavesdropper, often denoted as Eve, who endeavors to intercept or tamper with the quantum signals will inevitably introduce errors or irregularities, which can be detected by Alice and Bob. Through the implementation of suitable protocols and error correction techniques, Alice and Bob can generate a key that boasts provable security and randomness. This key can subsequently be utilized for encrypting and decrypting messages using conventional symmetric-key algorithms like AES or DES.

    The notable advantage of QKD lies in its ability to securely distribute keys, addressing a prominent vulnerability within classical cryptography. Additionally, QKD facilitates the frequent updating of keys, thereby amplifying the security and freshness of the encryption process. The conceptualization of QKD originated from independent proposals by Stephen Wiesner in 1970 and Charles Bennett and Gilles Brassard in 1984. The first experimental demonstration of QKD occurred in 1990, conducted by Bennett and John Smolin. Since then, QKD has been further developed and tested across diverse settings, including metropolitan networks, satellite links, and underwater channels.

    image Stephen Wiesner, 1988. Public Domain Image. Wikimedia Commons.

    Quantum-resistant cryptography

    Quantum-resistant cryptography, also known as post-quantum cryptography or quantum-proof cryptography, is a branch of classical cryptography that aims to create encryption methods that cannot be broken by quantum computers. Quantum computers are hypothetical machines that can exploit quantum phenomena to perform certain computations faster than classical computers.

    QRC is motivated by the fact that some of the most widely used public-key algorithms, such as RSA and ECC, are based on mathematical problems that are hard to solve with classical computers but easy to solve with quantum computers. For example, Shor’s algorithm is a quantum algorithm that can factor large numbers efficiently, which would break RSA encryption. Similarly, Grover’s algorithm is a quantum algorithm that can search unsorted databases faster than classical algorithms, which would reduce the security of symmetric-key algorithms. The objective is to develop novel public-key algorithms that rely on mathematical problems posing challenges for both classical and quantum computers in terms of solving them. Some of the candidates for quantum-resistant cryptography are based on lattice problems, code problems, multivariate problems, hash-based problems, or supersingular elliptic curve problems. These algorithms are currently being evaluated and standardized by various organizations, such as NIST and ETSI.


    Cryptography has evolved from simple manual methods to complex mechanized and digital systems, driven by the needs and demands of communication, security, and privacy. It has also played a very crucial role in many historical events (the Babington plot, for example), such as wars, revolutions, and discoveries, as well as in many modern applications, such as e-commerce, online banking, and cryptocurrency. It’s not only a practical tool, but also a scientific and mathematical discipline that explores the limits and possibilities of information theory, computation, and quantum physics. It is constantly changing and most certainly evolving, as new threats and opportunities emerge in the digital age.

    By:Sunny Labh Link:https://www.cantorsparadise.com/the-history-of-codes-and-cryptography-from-caesar-cipher-to-quantum-encryption-262992255320

    yakihonne.com iris.to jumble.social