NCC-05: The Missing Layer for Peer-to-Peer Applications

Today, we successfully demonstrated the power of NCC-05 (Identity-Bound Service Locator Resolution) by building a functional reference implementation: NCC-P2P-CLI .

NCC-05: The Missing Layer for Peer-to-Peer Applications

Today, we successfully demonstrated the power of NCC-05 (Identity-Bound Service Locator Resolution) by building a functional reference implementation: NCC-P2P-CLI.

While the CLI client works—allowing encrypted, private, peer-to-peer chat—it serves a greater purpose: proving that NCC-05 solves the “Rendezvous Problem” in decentralized networks.

The Core Breakthrough: Decoupling Identity from Location

In almost every networked application today, you need a middleman (a server, a dynamic DNS provider, or a static IP) to find another device. If a device moves, it disappears.

NCC-05 changes this by using the Nostr network as a decentralized, privacy-preserving signaling layer.

What We Proved Today

Through our implementation and integration tests, we verified that NCC-05 enables:

  1. True Network Mobility:

    • A client can migrate from one network (IP/Port) to another in real-time.
    • Peers automatically resolve the new location and reconnect via the Relay, with no central directory server.
  2. Privacy-First Discovery:

    • Encrypted Records: Your location data (IP, Onion address) is encrypted on the relay. Only authorized public keys can decrypt it to find you.
    • Tor Prioritization: The protocol natively supports and prioritizes .onion addresses, allowing for completely anonymous rendezvous.
  3. Identity-Based Routing:

    • Connections are made to an Identity (npub), not a machine.
    • This allows users to “own” their reachability, independent of their ISP or hosting provider.

Why This Matters

NCC-05 provides the foundational “dial tone” for a new generation of sovereign applications:

  • Serverless Collaboration: Docs, file sharing, and chat that connect directly device-to-device, using relays only for the initial handshake.
  • Sovereign IoT: Access your home node or personal server securely from anywhere without configuring dynamic DNS or opening router ports to the public web.
  • Censorship-Resistant Services: Services can float between hosting providers and networks while remaining reachable via a single, static cryptographic identity.

The NCC-P2P-CLI is just the beginning—a simple proof of what becomes possible when you turn the entire Nostr network into a secure, global Domain Name System for everything.

#nostr #nostrdev #ncc #ncc-05 #serverless #censorship #resistant #discovery #privacy #encryption

https://github.com/imattau/ncc-05


No comments yet.