Oak

Artifact [2ba770641a]
Login

Artifact [2ba770641a]

Artifact 2ba770641ac96e1d69bdb48c24ffa34795e625bf56589bc6f0a40bb3c885fcb8:


# ONS-2: Delegated NIP-13 Proof of Work

[⬑Index](index.md)

`status:wip`

## Background

Here we explore an approach to Delegated NIP-13 PoW (^See last section of NIP-13: [](https://github.com/nostr-protocol/nips/blob/master/13.md)), which shows how Nostr clients can outsource the PoW to a service provider in exchange for a fee.

---

## Definitions

> __PoW Trade__: the exchange of sats for outsourced Nostr PoW mining.

> __Client__: a Nostr user that wishes to outsource NIP-13 PoW for a note.

> __Provider__: a Nostr user who offers to generate NIP-13 PoWs in exchange for sats.

> __Note stub__: the message payload and tags which the Client wants to have mined. The resulting mined note will contain the note stub, a nonce-tag from the Provider and a timestamp also set by the Provider.

> __Blinded PoW solution__: Published, but not yet usable PoW solution. A full PoW solution would consist of PoW hash, nonce and timestamp. The blinded PoW contains only the hash and the timestamp. The nonce is not published, but can be derived once the invoice is paid because the invoice preimage = xor(PoW hash, PoW nonce).
>
>> Since the PoW hash is already published by the Provider with the Blinded PoW, the Client can tell if it's invalid without even paying to unblind the nonce.
>
>> An _invalid Blinded PoW_ will have a lower difficulty than the Client's target difficulty. In this case, the Client can determine the PoW solution is invalid and not pay to unblind it. In addition, such an invalid PoW can be an input in the Provider's reputation.
>
>> Conversely, the Client cannot tell if the PoW is truly valid until the nonce is unblinded and the hash is checked. Network participants can only do this after the preimage for this PoW has been published.

> __Unblinded PoW solution__: A combination of two published messages: the Blinded PoW and the preimage. With them, the Client can derive the nonce, which is the last piece of the puzzle needed to build a fully valid PoW note using the Client's payload and the Provider's hash.
>
>> Every preimage is linked to an associated Blinded PoW. So the act of publishing a preimage can be seen as _unblinding_ the PoW.

> __Valid invoice__: Invoice posted by the Provider together with the blinded PoW solution, which:
>
> * is for the exact amount specified by the Client in the Ask
> * has a timestamp that is within `timeframe` of the Client's Ask `created_at` timestamp
> * TODO appropriate `expiry`

> __Valid PoW solution__: A valid unblinded PoW. In other words, a combination of PoW hash, timestamp and (unblinded) nonce that, combined with the Client's payload, tags and pubkey, result in a valid Nostr message.

> __Reputation__: an indicator of a participant's trustworthiness. It's a metric derived entirely from the participant's behavior in previous past trades. For the Client, it shows whether the Client has paid the trade amount in the past. For the Provider, it shows whether the Provider has published valid PoWs for a certain hashrate or not.

---

## Trade Steps

1. Client publishes an Ask.

    * _I am willing to pay S sats for a valid PoW of difficulty D for my message, if delivered within time T._

2. Interested Providers start working on a PoW.

3. When ready, Providers publish their Blinded PoW and an invoice.

    * _I have mined such a PoW, here is the blinded version. You can unblind it by paying this invoice._

4. Client chooses one solution from a Provider, pays the associated invoice and publishes the preimage.

    * _I have chosen this solution and paid the LN invoice, here is the preimage as proof._
        * The preimage acts as proof of payment and unblinds the PoW.

5. Providers who posted PoWs but weren't chosen by the Client can optionally unblind their PoWs by publishing the preimage.

---

## Message Structs

### Payloads

Client Ask

```json
{
  target_difficulty: int, // Desired PoW difficulty
  timeframe_sec: int,     // The amount of time the Client is willing to wait for a PoW, from the Ask's created_at
  price_sats: int,        // The amount the Client is willing to pay for a PoW
  payload: string,        // The content of the message to be hashed
}
```

Provider Blinded PoW

```json
{
  mined_id: string,       // Mined PoW hash (ID of the equivalent Nostr PoW message). The achieved difficulty is obvious even before the nonce is unblinded.
  invoice_base64: string, // Base64 encoded BOLT11, the invoice the Client has to pay to get the preimage with which the nonce can be unblinded
  timestamp: int          // Timestamp used in mined note
}
```

Client Preimage

```json
{
  preimage: string        // The preimage
                          // Client acted honestly (paid) if it matches the invoice preimage hash.
                          // Provider acted honestly (sent a valid PoW) if a Nostr event with the unblinded nonce, the PoW timestamp and the Client payload hashes to the provided PoW hash. 
}
```

### JSON on the wire

Client Ask

```json
{
  "id": ...,
  "pubkey": ...,
  "created_at": ...,
  "kind": 100,
  "tags": [],
  "content": ...,         // Client Ask payload, as JSON
  "sig": ...
}
```

Provider Blinded PoW

```json
{
  "id": ...,              // Referenced later as Blinded PoW ID
  "pubkey": ...,
  "created_at": ...,
  "kind": 100,
  "tags": [
    ["e", <t_id>],        // Trade ID
  ],
  "content": ...,         // Blinded PoW payload, as JSON
  "sig": ...
}
```

Client Preimage

```json
{
  "id": ...,
  "pubkey": ...,
  "created_at": ...,
  "kind": 100,
  "tags": [
    ["e", <t_id>, ""],    // Trade ID = ID of Client Ask nostr message
    ["e", <p_id>, ""],    // Blinded PoW ID for the invoice in which this is a preimage
  ],
  "content": ...,         // Preimage
  "sig": ...
}
```

The on-wire payloads for a trade:

Client Ask:

```json
{
  "target_difficulty":10,
  "timeframe_sec":5,
  "price_sats":2000,
  "payload":"Hello world, I just bought the PoW for this message"
}
```

Blinded PoW:

```json
{
  "mined_id":"000bc799b094b3148599850890d9369c55959358defcb0f8bd69b32ed845c04e",
  "invoice_base64": "bG5iY3J0MjB1MXAzc2QyZHpwcDVscngzbWpwbGU4YTVhZ3BqbXR2eHh2bWprY2ZzamhldnR5dWdhM21nYTR3cWY5aHR4aHJzZHFxY3F6cGd4cXl6NXZxc3A1OGZjOXFocHRoemxkbXZxOTc3Z3d4cnQ0bHd1YzZlZzZ1dThycXdsZXk0NTdjeTAwc3h6czlxeXlzc3F6dTd5cnp1a3JkOXRubnRzM2NoaGRsYThreG1xYzZ1NmRwdjQydHRqd3V0d213a2doamxrZ21mZHMwMGo1Yzc2ZDg4dnNseTRyZjJocDBscmYwcDlhenV2aHJ1OWp3ODN6d3hsbjRncXdqdGpscw==",
  "timestamp":1661381026,
  "provider_pubkey":"625445913fc67242ade0dc8cc2d0341093ab83f11caa80cc7e1432b50f451257"
}
```

Preimage

```json
{
  "preimage":"000bc799b094b3148599850890d9369c55959358defcb0f8bd69b32ed845c06d"
}
```

---

## Failure Modes

A trade can fail due to

* invalid messages
* messages arriving too late
    * blinded PoW being posted after the Client's `timeframe` expired
* participants not responding

In all cases, it's obvious which party is at fault and what the penalty is. For example, an invalid message means the trade cannot continue and the perpetrator's reputation is tarnished. A PoW being posted too late means the Client does not have to pay for it. And a participant not responding when they should have had (e.g. a Client not paying for a PoW posted on time) again affects that participant's reputation.

1. Client publishes an Ask.

    * Client may post an invalid Ask (invalid message structure, out of range values, etc.)
        * Providers can choose to ignore it
        * May reflect badly on this Client's reputation

2. Interested Providers start working on a PoW.

    * No Provider starts working on it
        * Client will know this when no PoW is posted within the desired timeframe. Can react by increasing the price or the timeframe.

3. When ready, Providers publish their Blinded PoW and an invoice.

    * Provider may post an invalid invoice
    * Provider may post a Blinded PoW and an invoice after the `timeframe` expired
        * Client may or may not pay the invoice. Not paying would not reflect badly on Client's reputation.
        * Neutral to Provider's reputation.

4. Client chooses one solution, pays the associated invoice and publishes the preimage.

    * Client doesn't pay invoice
    * Client tries to pay but fails because Provider LN node not reachable, or no path found
        * Provider has an incentive to keep LN node running and well-connected, otherwise risks having found PoW for nothing
            * In a trade where multiple Providers posted PoWs, the Client can choose to pay another invoice for another PoW
            * Client not paying can be part of a more sophisticated reputation model
                * In a trade where only one PoW was posted: Client not having paid the invoice might be due to Provider LN node not reachable, so might not count negatively to Client's reputation
                * In a trade where multiple PoWs were posted: much more unlikely that LN nodes of all Providers were unreachable, so not paying any invoice might well count negatively to Client's reputation

    * Client pays another invoice, not the one posted by the Provider
        * Posted preimage will not match preimage hash posted by Provider.
        * This will count as not paying the trade amount.
        * Visible to any network observer, reflected in Client's reputation.
    * Client received only invalid invoices within `timeframe` and does not pay any of them
        * Visible to any network observer. Neutral to Client's reputation, but reflected in respective Providers' reputations.
    * Client publishes preimage for a valid invoice, but the Unblinded PoW is invalid
        * Visible to any network observer, reflected in Provider's reputation.

5. Providers who posted PoWs but weren't chosen by the Client can optionally unblind their PoWs by publishing the preimage.

    * Provider does not unblind own PoW
        * Neutral to Provider's reputation.
    * Provider unblinds own PoW, but results in an invalid PoW.
        * Negative to Provider's reputation.

---

## Risk and Reputation

Both participants face counterparty risk. To mitigate this, a reputation can be inferred from the counterpart's behavior in past trades.

The Client's risk is that paying a Provider's invoice might unblind an invalid PoW. To signal trustworthiness, the Provider's reputation can show whether this Provider:

* has a proven history of valid unblinded PoWs
    * Client may prefer Providers with a longer history
* has provided ANY invalid PoW in previous trades
    * Client may choose to ignore such Providers, regardless of how many other valid PoWs were provided

The Provider faces two risks: first, whether this Client will pay for a PoW delivered on time, and two, whether other Providers will find valid PoWs on time as well and therefore be chosen by the Client.

The first risk can be informed by the Client's past reputation, which can show whether the Client:

* has paid valid invoices before
    * a Provider may prefer a Client with a longer history
* has NOT PAID valid invoices in any previous trade, i.e. has not chosen at least one valid invoice in a previous trade
    * a Provider may choose to ignore such a Client, regardless how many other invoices were paid
* has paid invoices for trades of a comparable difficulty before
    * a Provider may ignore offers from Clients that suddenly ask for a high difficulty PoW, but have otherwise only asked for low-difficulty trades, or have no history of trades
        * this may indicate a "prank ask" by a Client, who wishes to waste Provider's hash-power with no intention to pay for the delivered PoW

The second risk depends on:

* luck
    * _Will I find a valid PoW within the Client's `timeframe`?_
* own hashrate
    * _With my available hashrate, how likely am I to find a valid PoW within the Client's `timeframe`?_
* other Provider's behavior
    * _How likely is it that other Providers will work on this and find a PoW significantly sooner than me?_

A Client will likely choose the fastest delivered PoW. With this in mind, a Provider can choose to prioritise the Client Asks for which it's very likely to find a PoW within the `timeframe` or even much sooner.

In other words, the second Provider risk can be addressed by Providers choosing to work on Client Asks where they're reasonably sure to over-deliver, or where the risk of under-delivering (and potentially not being paid) is acceptable.

Overall, the protocol provides ways for both Clients and Providers to infer the counterpart's trustworthiness and to minimize the trade risk.

---

## Incentives

Both participants have an incentive to act honestly in a trade in which they entered.

Moreover, Providers have an incentive to work on PoWs even if they're not chosen and paid in a particular trade, because this builds up their reputation with potential future clients.

Good reputations can lead to preferential rates, or even counterparty loyalty. A Client may choose to only select a specific Provider's PoWs despite other Providers over-delivering by posting PoWs faster.

Self-trading to inflate own reputation is dis-incentivised, because a trade involves finding a new valid PoW with a valid LN invoice timestamp.

---

## Timestamping

Reliable timestamps are needed only in step 2, when the Provider posts the blinded PoW.

More specifically, the invoice posted in Step 2 has to be:

* within the Client-specified `timeframe` from the Client Ask `created_at`
* a valid LN invoice, meaning it's timestamp has to be reasonably accurate, otherwise LN peers may ignore this node and payment may fail to route

A malicious provider could backdate their invoices with the intent of damaging the reputation of a Client. If a Client's Ask received no PoWs within its `timeframe` and the Client therefore paid no invoice, a later invoice that is backdated to appear within the Client's `timeframe` could damage the Client's reputation, making it appear that the Client hasn't paid for any valid PoW.

BOLT 7 (^ [](https://github.com/lightning/bolts/blob/master/07-routing-gossip.md)) lists requirements for the `timestamp` of LN protocol messages, including LN invoices. Backdating an invoice can therefore result in isolating the Provider LN node and making the invoice unpayable. However, a malicious Provider may not care about being isolated from the LN network or about losing the invoice, but may wish to only damage a Client's reputation.

A protocol modification that addresses this would have to use the relative freshness guarantees of LN messages to protect against Providers backdating their invoices. One protocol variant could require Providers to first pay a small invoice to the Client in order to find a secret that is necessary for the final PoW. The Client invoice can only be paid within its expiry timewindow and therefore Providers cannot backdate their messages.

A simpler and more robust solution is NIP-03(^[](https://github.com/nostr-protocol/nips/blob/master/03.md)) which allows Nostr events to include an optional OTS field. The attestation would tell observers that this message is at least as old as the OTS date. When determining reputation, messages without OTS would have a much lower weight than those with OTS.

---

## Price Discovery

Currently, there is no way for the Providers to signal at what price per difficulty they _would_ mine at.

However, a price signal can be deduced from recent successful trades, since all trade data is public, including prices.

---

## Data Persistence

An accurate reputation is built on accurate past trade data. However, there is no guarantee that past trade messages will be available indefinitely. There is also no guarantee of a continuous view of past messages, as relay outages or message propagation issues could cause some periods of trade history to become temporarily or permanently unavailable.

This means that reputation, which is derived from public historical trade data, is a soft approximation and not a hard metric.

Participants can increase its reliability by locally storing trade messages, and not depending entirely on live feeds from relays.

---

## DoS Protection for Miners

Miners may want to implement strategies against DoS. The naive case where a provider indiscriminately accepts and starts mining on Client Asks, exposes the miner to DoS attacks (^Credit to k00b for pointing this out).

Several strategies are possible. Here are a few examples:

* PoW in Client Ask: A miner could ignore Client Asks that have themselves low or no PoW attached. This could be a low difficulty level, like 10 or 15, which needs less than 1 second of mining on most modern hardware.
* Fidelity bond / Deposit for place on Whitelist: A miner could accept a deposit for lowering the Ask difficulty requirement, or for placing the Client pubkey on a whitelist.
* Sell place on Whitelist: A miner could place a Client pubkey on a whitelist for a small charge. This could be done outside the protocol.
* Whitelisting: A miner could only automine Asks from a few specific Clients


---

## Sample Scripts


Show the latest Client Asks:

```
echo '["REQ", "a", {"kinds": [100], "limit": 20} ]' | websocat wss://nostr-relay.wlvs.space | jq -s 'map(select(.[2].tags | length == 0)) | .[][2].content ' | jq -r . | jq .

# Latest trade IDs
echo '["REQ", "a", {"kinds": [100], "limit": 20} ]' | websocat wss://nostr-relay.wlvs.space | jq -s 'map(select(.[2].tags | length == 0)) | .[][2].id ' | jq -r . 
```

Show the latest mined PoWs:

```
echo '["REQ", "a", {"kinds": [100], "limit": 10} ]' | websocat wss://nostr-relay.wlvs.space | jq -s 'map(select(.[2].tags | length == 1)) | .[][2].content ' | jq -r . | jq -r .mined_id
```


Show the latest published preimages (successfully complete trades) :

```
echo '["REQ", "a", {"kinds": [100], "limit": 30} ]' | websocat wss://nostr-relay.wlvs.space | jq -s 'map(select(.[2].tags | length == 2)) | .[][2] ' | jq -r .content
```