Use protocols, not services

Protocols vs services and the IRC/Discord split

  • Freenode → Libera is cited as evidence that open protocols let communities escape hostile operators: users largely just moved servers.
  • Others argue it was a “last nail in the coffin” for IRC, with many projects moving to Discord; the migration shows that convenience and features (history, media, voice) trump protocol purity for most groups.
  • Several comments stress that people consciously traded freedom and portability for rapid feature development and polished UX; when enshittification hits, it’s important to remember that trade was made.
  • Discord’s success is attributed less to protocol superiority and more to subsidized hosting, integrated voice/video, and piggybacking on existing gaming communities.

XMPP, Matrix, Nostr and protocol design

  • XMPP gets renewed enthusiasm: extensible, standards-oriented, and capable of Discord‑like features; some are building new clients and highlight niche uses like managing network switches.
  • Critics say XMPP introduced centralization and identifier leakage compared to IRC, and that XML is a liability (complex, easy to mis-implement) rather than a strength.
  • Matrix is viewed by some as a good identity model but a difficult, heavyweight protocol; others link to criticisms about its complexity and security.
  • Nostr is praised for simplicity and offline/sneakernet use, but its identity and relay design are called fragile, lossy, and prone to centralization via “sticky” relays.

Identity as the real problem

  • Many commenters think the core issue isn’t protocols vs services but identity vs applications.
  • Losing a Gmail account or domain means losing a de facto identity; people want identities independent of any provider.
  • Proposed directions: custom domains, DIDs, atproto-style schemes, or government-backed digital IDs with strong privacy guarantees.
  • There’s tension between needing sybil resistance (to fight spam/abuse) and distrust of governments or corporations as ultimate identity authorities.
  • Views diverge on whether identity should be durable or deliberately easy to discard; durability is useful for accounts and reputation, but also increases risk after compromise.

Government control and regulation

  • The article’s claim that you “can’t” enforce age verification or similar rules on decentralized protocols is contested.
  • Skeptics argue states can simply pressure DNS, payment processors, and datacenters, or punish a subset of operators until the rest comply.
  • Supporters counter that attacking thousands of small nodes across jurisdictions is much harder than regulating a few large platforms, though most admit this advantage is “for now” and politically contingent.

AI, spam, and economic shifts

  • Some see decentralized protocols as a counterweight to AI-fueled centralization: LLMs make app-building cheap, so competition rises and margins fall, which may favor small, protocol-friendly tools.
  • Others worry about “100 billion bots” overwhelming any open protocol with spam, scams, and manipulation; cost may not be a limiting factor if attackers profit.
  • Ideas floated: stricter gatekeeping, phone-number–based trust scores, layered networks with increasing authenticity, or stronger identity systems. No consensus on a clean solution.

Usability and self‑hosting hurdles

  • Several people report painful experiences self-hosting Matrix or XMPP: complex setups, multiple components (TURN, Livekit), flaky NAT traversal, poor video quality.
  • Nostr is seen as philosophically appealing but immature: limited clients, rough UX, incomplete long-form and email-like use cases.
  • This leads to a recurring theme: protocols without high-quality, easy-to-deploy reference implementations remain toys for enthusiasts rather than mainstream replacements for Discord/Slack.

Examples of protocol-centric systems

  • Plan 9’s 9P-based “gridchat” is mentioned as a pure “protocols, not services” environment: chat, media, and editing all wired together via a shared filesystem-like protocol and small scripts, giving users total client-side control.
  • Local-first and peer-to-peer designs are highlighted as the next frontier that could push services further out of the loop, though they still face the same identity and spam challenges.