{"id":404,"date":"2026-05-19T12:16:28","date_gmt":"2026-05-19T12:16:28","guid":{"rendered":"https:\/\/thethriftydev.com\/blog\/mandatory-id-social-media-phone-kyc-nostr\/"},"modified":"2026-05-21T22:27:02","modified_gmt":"2026-05-21T22:27:02","slug":"mandatory-id-social-media-phone-kyc-nostr","status":"publish","type":"post","link":"https:\/\/thethriftydev.com\/blog\/mandatory-id-social-media-phone-kyc-nostr\/","title":{"rendered":"Mandatory ID Is Coming for Phones and Social Media. Here\u2019s How to Move to Nostr Before the Gate Closes"},"content":{"rendered":"<p>The internet is quietly turning into an ID checkpoint \u2014 and most people will not notice until they are standing in front of it.<\/p>\n<p>Not all at once. Not with one giant law that says \u201canonymous speech is illegal now.\u201d That would be too obvious.<\/p>\n<p>It\u2019s happening through \u201creasonable\u201d sounding rules.<\/p>\n<ul>\n<li>Stop robocalls.<\/li>\n<li>Protect the children.<\/li>\n<li>Verify users.<\/li>\n<li>Know your customer.<\/li>\n<li>Prevent bots.<\/li>\n<li>Fight fraud.<\/li>\n<\/ul>\n<p>Every one of those goals sounds good on paper. Nobody likes robocalls. Nobody wants kids exploited online. Nobody wants scam farms running wild.<\/p>\n<p>But the solution governments and platforms keep reaching for is the same every time:<\/p>\n<p>Show ID before you communicate.<\/p>\n<p>That is the line. Once you see it, you can\u2019t unsee it.<\/p>\n<p>We already covered the FCC side of this in detail here: <a href=\"https:\/\/thethriftydev.com\/blog\/fcc-wants-your-id-to-activate-a-phone-privacy-is-dead\/\" rel=\"noopener noreferrer\">https:\/\/thethriftydev.com\/blog\/fcc-wants-your-id-to-activate-a-phone-privacy-is-dead\/<\/a><\/p>\n<p>The short version: the FCC is exploring stronger \u201cKnow Your Customer\u201d rules for voice providers. In plain English, that means phone companies may be pushed to collect and verify identity information before activating service.<\/p>\n<p>And at the same time, governments in the U.S. and abroad are pushing age verification and identity checks for social media access.<\/p>\n<p>Phones. Social media. Messaging. Online speech.<\/p>\n<p>The walls are moving inward.<\/p>\n<p>So this post is not just another rant about privacy. This is a practical migration guide.<\/p>\n<p>If <a href=\"https:\/\/www.facebook.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Facebook<\/a>, <a href=\"https:\/\/x.com\/\" rel=\"noopener noreferrer nofollow\">X<\/a>, Instagram, TikTok, or your cell provider starts demanding more identity than you are willing to hand over, you need somewhere else to go.<\/p>\n<p>That somewhere is decentralized social media.<\/p>\n<p>And for most regular people, the best place to start is Nostr.<\/p>\n<h2>What Is Actually Happening?<\/h2>\n<p>Let\u2019s separate facts from panic.<\/p>\n<p>Important caveat up front: the FCC has not finalized a universal \u201cshow ID for every phone\u201d rule yet. What it has done is move forward with a Further Notice of Proposed Rulemaking called FCC 26-27.<\/p>\n<figure class=\"wp-block-image size-large thriftydev-inline-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/01-id-checkpoint.png\" alt=\"Government ID checkpoint blocking phone and social media access\" class=\"wp-image-410\" srcset=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/01-id-checkpoint.png 1200w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/01-id-checkpoint-300x169.png 300w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/01-id-checkpoint-1024x576.png 1024w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/01-id-checkpoint-768x432.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<p>That matters because this is the stage where the agency is asking what the final rule should look like.<\/p>\n<p>And what they are asking about should make every privacy-minded person sit up straight.<\/p>\n<p>The FCC is seeking comment on requiring originating voice providers to collect and retain identity information from new and renewing customers before granting access to service.<\/p>\n<p>That information may include:<\/p>\n<ul>\n<li>Name<\/li>\n<li>Physical address<\/li>\n<li>Government-issued identification number<\/li>\n<li>Alternate telephone number<\/li>\n<li>Supporting records, potentially including copies of government-issued ID<\/li>\n<\/ul>\n<p>For higher-volume customers, the FCC is also asking about collecting intended use of service and IP addresses.<\/p>\n<p>It also asks about prepaid service, postpaid service, third-party prepaid SIM cards, bulk SIM activation, re-verification, suspicious activity triggers, and retaining customer identity records for four years after the relationship ends.<\/p>\n<p>Again: this is being framed as an anti-robocall measure.<\/p>\n<p>But the result could be a world where anonymous or semi-anonymous phone access becomes much harder, especially for prepaid phones and VoIP.<\/p>\n<p>That hits the exact people who often need private communication the most:<\/p>\n<ul>\n<li>Domestic violence survivors<\/li>\n<li>Whistleblowers<\/li>\n<li>Journalists and confidential sources<\/li>\n<li>Political dissidents<\/li>\n<li>Protest organizers<\/li>\n<li>People without stable housing<\/li>\n<li>People without current ID<\/li>\n<li>Poor users who rely on prepaid phones<\/li>\n<li>Ordinary people who simply do not want every communication tool tied to a government identity document<\/li>\n<\/ul>\n<p>Now put that next to what is happening with social media.<\/p>\n<p>Governments are pushing age verification and ID-based access rules for online platforms. Some are aimed at adult content. Some target social media. Some require parental consent. Some require platforms to verify age or block minors.<\/p>\n<p>The details vary by jurisdiction, but the pattern is the same:<\/p>\n<p>Before you can speak, read, post, follow, organize, or participate, some gatekeeper must decide whether your identity is acceptable.<\/p>\n<p>That is a dangerous direction.<\/p>\n<figure class=\"wp-block-image size-large thriftydev-inline-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/02-data-honeypot.png\" alt=\"Identity data flowing into a centralized database vault\" class=\"wp-image-411\" srcset=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/02-data-honeypot.png 1200w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/02-data-honeypot-300x169.png 300w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/02-data-honeypot-1024x576.png 1024w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/02-data-honeypot-768x432.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<h2>The Constitutional Problem<\/h2>\n<p>This is where people need to understand something basic:<\/p>\n<p>Anonymous speech is not some weird internet loophole.<\/p>\n<p>Anonymous speech is part of the American tradition.<\/p>\n<p>The Federalist Papers were written under pseudonyms. Political pamphlets were often anonymous. People have always needed the ability to speak without attaching their legal name to every unpopular idea.<\/p>\n<p>The <a href=\"https:\/\/www.eff.org\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Electronic Frontier Foundation<\/a> puts it plainly: the Supreme Court has repeatedly recognized that anonymous speech is protected by the First Amendment. <a href=\"https:\/\/www.eff.org\/issues\/anonymity\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">EFF<\/a> also notes that secure anonymity can be life-saving for whistleblowers, human rights workers, domestic violence survivors, and people facing retaliation.<\/p>\n<p>That is the key point.<\/p>\n<p>Privacy is not just about hiding bad behavior.<\/p>\n<p>Privacy is what lets good people act before powerful people can punish them.<\/p>\n<p>Mandatory ID systems create at least four major constitutional and civil-liberties problems.<\/p>\n<h3>1. First Amendment chilling effect<\/h3>\n<p>If people have to show government ID before accessing social media, many will not speak at all.<\/p>\n<p>Not because they are criminals.<\/p>\n<p>Because they are afraid.<\/p>\n<p>Afraid of employers. Afraid of abusive partners. Afraid of mobs. Afraid of government lists. Afraid of leaks. Afraid of being punished later when political winds change.<\/p>\n<p>A right you are afraid to use is a right being chilled.<\/p>\n<h3>2. Anonymous association<\/h3>\n<p>Speech is not just what you post. It is who you follow, who you message, what groups you join, what movements you support, and what communities you quietly learn from.<\/p>\n<p>Identity-gated platforms turn association into a record.<\/p>\n<p>That matters for religious groups, political movements, health communities, addiction recovery, abuse survivors, and anyone exploring ideas that might be socially risky.<\/p>\n<h3>3. Overbreadth and vague enforcement<\/h3>\n<p>A lot of these laws are written broadly. They do not just target obviously harmful material. They can sweep up general-purpose social media, forums, comment sections, messaging features, and platforms that host lawful speech.<\/p>\n<figure class=\"wp-block-image size-large thriftydev-inline-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/03-anonymous-speech.png\" alt=\"Anonymous speech and pseudonymous online identity illustration\" class=\"wp-image-412\" srcset=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/03-anonymous-speech.png 1200w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/03-anonymous-speech-300x169.png 300w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/03-anonymous-speech-1024x576.png 1024w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/03-anonymous-speech-768x432.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<p>Courts have already blocked some state social media age-verification laws on First Amendment grounds.<\/p>\n<p>That does not mean every ID law will automatically fall. The legal landscape is mixed, especially around adult-content age verification.<\/p>\n<p>But social media is not a dirty magazine behind the counter. It is where people read news, organize communities, debate politics, document police activity, worship, campaign, build businesses, and maintain relationships.<\/p>\n<p>Putting an ID checkpoint in front of that is not a small burden.<\/p>\n<h3>4. Privacy and data honeypots<\/h3>\n<p>Even if you trust today\u2019s government, do you trust every agency, contractor, platform, carrier, data broker, hacker, and future administration that may touch the data?<\/p>\n<p>Mandatory ID systems create databases.<\/p>\n<p>Databases leak.<\/p>\n<p>Databases get abused.<\/p>\n<p>Databases get subpoenaed.<\/p>\n<p>Databases get sold, copied, breached, correlated, and repurposed.<\/p>\n<p>A phone company collecting ID to stop robocalls today can become a map of dissidents tomorrow.<\/p>\n<p>A social media platform collecting ID for age verification today can become a political targeting database tomorrow.<\/p>\n<p>This is not paranoia. This is what data does. Once collected, it grows legs.<\/p>\n<h2>Why Centralized Platforms Are the Wrong Place to Bet Your Future<\/h2>\n<p><a href=\"https:\/\/www.facebook.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Facebook<\/a> and <a href=\"https:\/\/x.com\/\" rel=\"noopener noreferrer nofollow\">X<\/a> are easy because everyone is there.<\/p>\n<p>That is also the trap.<\/p>\n<p>Centralized platforms have one login system, one moderation system, one algorithm, one policy department, one legal pressure point, and one kill switch for your account.<\/p>\n<p>If they decide your name is wrong, your ID is insufficient, your post is misinformation, your reach should be throttled, your account should be suspended, or your country should be blocked, you have very little recourse.<\/p>\n<p>You do not own your audience.<\/p>\n<p>You rent access to it.<\/p>\n<p>That rent can be raised at any time.<\/p>\n<p>And when governments start pressuring platforms to require ID, centralized networks are the easiest targets. Regulators do not need to control every user. They only need to control the handful of companies everyone depends on.<\/p>\n<figure class=\"wp-block-image size-large thriftydev-inline-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/04-centralized-platform.png\" alt=\"Centralized social platform acting as a locked communication silo\" class=\"wp-image-413\" srcset=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/04-centralized-platform.png 1200w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/04-centralized-platform-300x169.png 300w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/04-centralized-platform-1024x576.png 1024w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/04-centralized-platform-768x432.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<p>That is why the answer is not \u201cfind a nicer platform.\u201d<\/p>\n<p>The answer is to move toward protocols.<\/p>\n<h2>What Makes <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> Different?<\/h2>\n<p><a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> stands for \u201cNotes and Other Stuff Transmitted by Relays.\u201d<\/p>\n<p>Ignore the weird acronym for a second. The concept is simple.<\/p>\n<p><a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> is not one app.<\/p>\n<p><a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> is a protocol.<\/p>\n<p>That means many different apps can speak the same language, the same way many different email apps can send and receive email.<\/p>\n<p>On <a href=\"https:\/\/x.com\/\" rel=\"noopener noreferrer nofollow\">X<\/a>, your account belongs to X.<\/p>\n<p>On <a href=\"https:\/\/www.facebook.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Facebook<\/a>, your account belongs to Facebook.<\/p>\n<p>On <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a>, your identity is a cryptographic key pair:<\/p>\n<ul>\n<li>Your public key is like your username or address.<\/li>\n<li>Your private key is the secret that proves you own that identity.<\/li>\n<\/ul>\n<p>If you use one <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> app and hate it, you can use another. Your identity moves with you.<\/p>\n<p>That is the magic.<\/p>\n<p>You are not trapped inside one company\u2019s app.<\/p>\n<p><a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> clients are the apps you use to read and post. Examples include:<\/p>\n<ul>\n<li><a href=\"https:\/\/primal.net\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Primal<\/a><\/li>\n<li><a href=\"https:\/\/damus.io\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Damus<\/a><\/li>\n<li><a href=\"https:\/\/amethyst.social\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Amethyst<\/a><\/li>\n<li>Ditto<\/li>\n<\/ul>\n<p><a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> relays are servers that receive, store, and broadcast posts. You can use multiple relays. You can switch relays. Technical users can run their own relay.<\/p>\n<p>This makes <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> more resilient than a normal social network.<\/p>\n<p>Not perfect. Not magic. Not immune to every attack.<\/p>\n<p>But structurally different.<\/p>\n<p>There is no single company that owns the whole network.<\/p>\n<h2>The Most User-Friendly Way to Move From <a href=\"https:\/\/www.facebook.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Facebook<\/a> or <a href=\"https:\/\/x.com\/\" rel=\"noopener noreferrer nofollow\">X<\/a> to <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a><\/h2>\n<p>Here is the beginner path I would recommend for normal people.<\/p>\n<p>Not the most hardcore setup. Not the most paranoid setup. The most usable one \u2014 because a migration plan people will actually follow beats a perfect plan nobody uses.<\/p>\n<h3>Step 1: Create a <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> identity with a beginner-friendly client<\/h3>\n<p>Start with <a href=\"https:\/\/primal.net\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Primal<\/a> if you want the least friction.<\/p>\n<figure class=\"wp-block-image size-large thriftydev-inline-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/05-nostr-network.png\" alt=\"Decentralized Nostr relay network illustration\" class=\"wp-image-414\" srcset=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/05-nostr-network.png 1200w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/05-nostr-network-300x169.png 300w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/05-nostr-network-1024x576.png 1024w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/05-nostr-network-768x432.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<p>It works on web, iOS, and Android. It feels more like a normal social app than many older <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> tools.<\/p>\n<p>Download it, create an account, and write down\/back up your private key.<\/p>\n<p>This is critical:<\/p>\n<p>If you lose your private key, you lose the account.<\/p>\n<p>If someone steals your private key, they can take over the account.<\/p>\n<p>There is no \u201cforgot password\u201d button for the protocol itself.<\/p>\n<p>Store the private key in a password manager. Do not paste it into random websites. Do not screenshot it and leave it in your camera roll. Treat it like the keys to your house.<\/p>\n<h3>Step 2: Set up your profile<\/h3>\n<p>Use a recognizable name, photo, and bio if you want people from Facebook\/X to find you.<\/p>\n<p>If you need pseudonymity, use a pseudonym from the beginning and do not mix it with your real identity.<\/p>\n<p>Do not make the classic mistake of creating an \u201canonymous\u201d account and then importing every real-world detail from your public profiles.<\/p>\n<p>Privacy is a system, not a username.<\/p>\n<h3>Step 3: Find people to follow<\/h3>\n<p>Search for people by name, public key, or <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> address.<\/p>\n<p>Look for creators who have posted their npub on X.<\/p>\n<p>Use discovery tools and starter lists.<\/p>\n<p>Follow aggressively at first. <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> gets better when you build your own graph.<\/p>\n<p>Unlike algorithmic platforms, your feed is often more directly shaped by who you follow and which relays your client uses.<\/p>\n<p>That is a feature, not a bug.<\/p>\n<h3>Step 4: Post a migration notice on your old platforms<\/h3>\n<p>Do not rage-delete <a href=\"https:\/\/www.facebook.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Facebook<\/a> or <a href=\"https:\/\/x.com\/\" rel=\"noopener noreferrer nofollow\">X<\/a> on day one.<\/p>\n<p>Use them as bridges.<\/p>\n<p>Post something like:<\/p>\n<p>\u201cI\u2019m moving more of my posting to <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> because I want social media that is not tied to one company, one algorithm, or one ID checkpoint. You can find me here: [your <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> npub \/ profile link]. I\u2019ll still check this account for now, but <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> is where I\u2019m building long-term.\u201d<\/p>\n<figure class=\"wp-block-image size-large thriftydev-inline-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/06-key-backup.png\" alt=\"Private key backup protected inside a secure vault\" class=\"wp-image-415\" srcset=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/06-key-backup.png 1200w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/06-key-backup-300x169.png 300w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/06-key-backup-1024x576.png 1024w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/06-key-backup-768x432.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<p>Pin it.<\/p>\n<p>Repeat it.<\/p>\n<p>Put your <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> public key in your bio.<\/p>\n<p>The goal is not dramatic exit. The goal is audience migration.<\/p>\n<h3>Step 5: Cross-post for a while<\/h3>\n<p>For the first 30-90 days, post on both.<\/p>\n<p>Your old network is the funnel. <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> is the destination.<\/p>\n<p>When someone replies on Facebook\/X, answer there, but also remind them where you are moving.<\/p>\n<p>Make it easy. Most people will not move because of ideology alone. They move because someone they care about is already there and the path is simple.<\/p>\n<h3>Step 6: Back up your contacts and key information<\/h3>\n<p>Do not rely on any one platform to remember your people for you.<\/p>\n<p>Keep a separate list of:<\/p>\n<ul>\n<li>Important contacts<\/li>\n<li><a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> public keys<\/li>\n<li>Email addresses<\/li>\n<li>Websites<\/li>\n<li>Signal\/Session\/SimpleX\/Matrix handles if applicable<\/li>\n<li>Emergency contact methods<\/li>\n<\/ul>\n<p>This is boring until the day it saves you.<\/p>\n<h3>Step 7: Learn relays without obsessing over them<\/h3>\n<p>At first, let your client handle relays.<\/p>\n<p>Later, learn the basics:<\/p>\n<p>Relays store and broadcast <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> events. If a relay disappears, posts stored only there may become hard or impossible to retrieve. Using multiple relays gives you more redundancy. Running your own relay gives you more control.<\/p>\n<p>For most beginners, the goal is simple:<\/p>\n<p>Use a good client, connect to several reputable relays, and do not keep your entire social life dependent on one server.<\/p>\n<h2>What <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> Can and Cannot Do If the Internet Gets Shut Down<\/h2>\n<p>This part needs honesty.<\/p>\n<p><a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> normally uses the internet.<\/p>\n<p>If your phone has no data, your home internet is down, and you cannot reach any relays, your normal <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> app is not going to magically post through the air.<\/p>\n<figure class=\"wp-block-image size-large thriftydev-inline-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/07-migration-bridge.png\" alt=\"Migration bridge from centralized platforms to open social protocols\" class=\"wp-image-416\" srcset=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/07-migration-bridge.png 1200w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/07-migration-bridge-300x169.png 300w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/07-migration-bridge-1024x576.png 1024w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/07-migration-bridge-768x432.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<p>But <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> still matters for resilience because it removes the single-platform dependency.<\/p>\n<p>If <a href=\"https:\/\/x.com\/\" rel=\"noopener noreferrer nofollow\">X<\/a> blocks you, you can still use Nostr.<\/p>\n<p>If one <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> client disappears, you can use another.<\/p>\n<p>If one relay blocks you, you can use another.<\/p>\n<p>If you run your own relay, you have a stronger anchor for your own speech.<\/p>\n<p>That is resilience at the social-network layer.<\/p>\n<p>For actual no-cell\/no-internet communication, pair <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> with tools designed for that job.<\/p>\n<p>That means:<\/p>\n<ul>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/meshtastic-build-your-own-off-grid-mesh-network\/\" rel=\"noopener noreferrer\">Meshtastic<\/a> for LoRa-based off-grid text messaging<\/li>\n<li><a href=\"https:\/\/briarproject.org\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Briar<\/a> for peer-to-peer messaging over Bluetooth, Wi-Fi, or Tor<\/li>\n<li>Local Wi-Fi networks for neighborhood\/community communication<\/li>\n<li>Ham radio where legal and appropriate<\/li>\n<li>Printed contact plans and offline meet-up protocols for emergencies<\/li>\n<\/ul>\n<p>We already wrote a guide to <a href=\"https:\/\/thethriftydev.com\/blog\/meshtastic-build-your-own-off-grid-mesh-network\/\" rel=\"noopener noreferrer\">Meshtastic<\/a> here: <a href=\"https:\/\/thethriftydev.com\/blog\/meshtastic-build-your-own-off-grid-mesh-network\/\" rel=\"noopener noreferrer\">https:\/\/thethriftydev.com\/blog\/meshtastic-build-your-own-off-grid-mesh-network\/<\/a><\/p>\n<p>That is the practical off-grid layer.<\/p>\n<p>There are also experimental bridges that connect <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> and Meshtastic. One project, <a href=\"https:\/\/github.com\/QuixoteSystems\/nostrastic\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostrastic<\/a>, describes a proof-of-concept for publishing <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> posts and sending\/receiving DMs over <a href=\"https:\/\/meshtastic.org\/docs\/overview\/radio-settings\/#lora\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">LoRa<\/a> using <a href=\"https:\/\/thethriftydev.com\/blog\/meshtastic-build-your-own-off-grid-mesh-network\/\" rel=\"noopener noreferrer\">Meshtastic<\/a> with at least one gateway device connected to the internet\/MQTT.<\/p>\n<p>That is cool. It points toward where things can go.<\/p>\n<p>But do not confuse experimental bridging with a guaranteed emergency system.<\/p>\n<p>If you want resilient communications, build a stack:<\/p>\n<p><a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> for censorship-resistant public social identity.<\/p>\n<p><a href=\"https:\/\/thethriftydev.com\/blog\/meshtastic-build-your-own-off-grid-mesh-network\/\" rel=\"noopener noreferrer\">Meshtastic<\/a> for local off-grid text.<\/p>\n<p><a href=\"https:\/\/briarproject.org\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Briar<\/a> or SimpleX\/Session for private messaging without phone-number dependence.<\/p>\n<p>A password manager for your keys.<\/p>\n<p>A printed contact sheet for when all the apps fail.<\/p>\n<p>That is how you stop depending on one fragile pipe.<\/p>\n<h2>The Simple Migration Checklist<\/h2>\n<p>If you only do the basics, do this:<\/p>\n<ol>\n<li>Create a <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> account with <a href=\"https:\/\/primal.net\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Primal<\/a>, <a href=\"https:\/\/damus.io\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Damus<\/a>, or <a href=\"https:\/\/amethyst.social\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Amethyst<\/a>.<\/li>\n<li>Save your <a href=\"https:\/\/nostr.how\/en\/get-started#understanding-keys\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr private key<\/a> in a password manager.<\/li>\n<li>Set up your profile.<\/li>\n<li>Follow 50-100 people so your feed is alive.<\/li>\n<li>Put your <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> public key\/profile link in your <a href=\"https:\/\/x.com\/\" rel=\"noopener noreferrer nofollow\">X<\/a>\/<a href=\"https:\/\/www.facebook.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Facebook<\/a> bio.<\/li>\n<li>Pin a migration post on your old accounts.<\/li>\n<li>Cross-post for 30-90 days.<\/li>\n<li>Move important conversations to tools that do not require phone numbers, such as <a href=\"https:\/\/getsession.org\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Session<\/a>, <a href=\"https:\/\/simplex.chat\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">SimpleX Chat<\/a>, or <a href=\"https:\/\/briarproject.org\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Briar<\/a>.<\/li>\n<li>Read the <a href=\"https:\/\/thethriftydev.com\/blog\/meshtastic-build-your-own-off-grid-mesh-network\/\" rel=\"noopener noreferrer\">Meshtastic guide<\/a> and consider buying two devices before you need them.<\/li>\n<li>Keep an offline copy of critical contacts.<\/li>\n<\/ol>\n<figure class=\"wp-block-image size-large thriftydev-inline-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/08-offgrid-mesh.png\" alt=\"Meshtastic style off-grid mesh radios forming a local network\" class=\"wp-image-417\" srcset=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/08-offgrid-mesh.png 1200w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/08-offgrid-mesh-300x169.png 300w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/08-offgrid-mesh-1024x576.png 1024w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/08-offgrid-mesh-768x432.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<p>That is it.<\/p>\n<p>This is how you start moving from rented reach to owned reach.<\/p>\n<p>You do not need to become a cryptography expert.<\/p>\n<p>You do not need to self-host everything on day one.<\/p>\n<p>You just need to stop letting one corporation and one government ID system sit between you and your ability to communicate.<\/p>\n<h2>Why Move Now?<\/h2>\n<p>Because migration is easiest before it is urgent.<\/p>\n<p>When platforms demand ID, it is too late to calmly move your audience.<\/p>\n<p>When your phone number becomes harder to activate privately, it is too late to build alternate contact paths.<\/p>\n<p>When your account is locked, your reach is throttled, or your old platform becomes unusable, it is too late to discover that nobody knows where else to find you.<\/p>\n<p>The time to build parallel systems is while the old ones still work.<\/p>\n<p>That does not mean panic.<\/p>\n<p>It means preparation.<\/p>\n<p>The government may say mandatory ID is about robocalls, fraud, bots, and child safety.<\/p>\n<p>Social media companies may say it is about trust and authenticity.<\/p>\n<p>But your rights do not survive on slogans. They survive in architecture.<\/p>\n<p>If all your speech runs through identity-gated platforms, your speech is permissioned.<\/p>\n<p>If your audience only exists inside corporate apps, your audience is rented.<\/p>\n<p>If your communication depends entirely on phone numbers tied to government ID, your private life is one policy change away from exposure.<\/p>\n<p>So start moving.<\/p>\n<figure class=\"wp-block-image size-large thriftydev-inline-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"675\" src=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/09-resilience-stack.png\" alt=\"Resilient communication stack with decentralized and off-grid layers\" class=\"wp-image-418\" srcset=\"https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/09-resilience-stack.png 1200w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/09-resilience-stack-300x169.png 300w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/09-resilience-stack-1024x576.png 1024w, https:\/\/thethriftydev.com\/blog\/wp-content\/uploads\/2026\/05\/09-resilience-stack-768x432.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n<p>Create the <a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr<\/a> account.<\/p>\n<p>Back up your keys.<\/p>\n<p>Move your people.<\/p>\n<p>Build the parallel network now, while the move is still voluntary and calm instead of forced and chaotic.<\/p>\n<p>Stay free. Stay reachable. Stay hard to shut down.<\/p>\n<p>\u2014 TheThriftyDev<\/p>\n<h2>Follow the Build on Nostr<\/h2>\n<p>If you want to watch the actual dev log instead of algorithm-filtered scraps, follow TheThriftyDev on Nostr too. I\u2019m posting Bleach Unlimited parity updates, open-source build notes, and raw progress there without the usual feed games.<\/p>\n<p><a href=\"https:\/\/njump.to\/nprofile1qqs9xd9x2kzfwsxz4qw9nfpdfry5ffxyup2wjg4a6tvnn9gafme393cpzpmhxue69uhkummnw3ezumt0d5hszrnhwden5te0dehhxtnvdakz7qgawaehxw309ahx7um5wghxy6t5vdhkjmn9wgh8xmmrd9skctcqp4y5j\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Follow TheThriftyDev on Nostr<\/a><\/p>\n<p>That is the whole point of this migration: own your social graph before the gatekeepers decide who gets to speak, who gets buried, and who has to show papers first.<\/p>\n<h2>Sources and Further Reading<\/h2>\n<ul>\n<li><a href=\"https:\/\/cyberscoop.com\/fcc-know-your-customer-supply-chain-security-rules\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">CyberScoop: FCC tightens KYC rules for telecoms<\/a><\/li>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/fcc-wants-your-id-to-activate-a-phone-privacy-is-dead\/\" rel=\"noopener noreferrer\">TheThriftyDev: FCC Wants Your ID to Activate a Phone \u2014 Privacy Is Dead<\/a><\/li>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/meshtastic-build-your-own-off-grid-mesh-network\/\" rel=\"noopener noreferrer\">TheThriftyDev: Meshtastic \u2014 Build Your Own Off-Grid Mesh Network<\/a><\/li>\n<li><a href=\"https:\/\/www.eff.org\/issues\/anonymity\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Electronic Frontier Foundation: Anonymity<\/a><\/li>\n<li><a href=\"https:\/\/nostr.com\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr homepage<\/a><\/li>\n<li><a href=\"https:\/\/nostr.how\/en\/get-started\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr.how: Get started with Nostr<\/a><\/li>\n<li><a href=\"https:\/\/nostr.how\/en\/relays\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostr.how: What are Nostr relays?<\/a><\/li>\n<li><a href=\"https:\/\/github.com\/QuixoteSystems\/nostrastic\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Nostrastic proof-of-concept: Nostr over Meshtastic\/LoRa<\/a><\/li>\n<\/ul>\n<p><!-- ttd-bulk:nostr-comparison:start --><\/p>\n<h3>Nostr vs Traditional Social: Quick Comparison<\/h3>\n<figure class=\"wp-block-table\">\n<table>\n<thead>\n<tr>\n<th>Feature<\/th>\n<th>Traditional social<\/th>\n<th>Nostr<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Architecture<\/td>\n<td>Centralized platform<\/td>\n<td>Decentralized relays<\/td>\n<\/tr>\n<tr>\n<td>Phone required<\/td>\n<td>Often required or pressured<\/td>\n<td>No phone required by protocol<\/td>\n<\/tr>\n<tr>\n<td>Censorship risk<\/td>\n<td>High platform control<\/td>\n<td>Lower, relay choice matters<\/td>\n<\/tr>\n<tr>\n<td>Data ownership<\/td>\n<td>Platform account owns reach<\/td>\n<td>You own your keys<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><!-- ttd-bulk:nostr-comparison:end --><\/p>\n<p><!-- ttd-bulk:nostr-start:start --><\/p>\n<h3>Get Started on Nostr in 5 Minutes<\/h3>\n<ol>\n<li>Download Damus on iOS or Amethyst on Android.<\/li>\n<li>Create a key pair and back up your private key safely.<\/li>\n<li>Add reliable relays.<\/li>\n<li>Start posting and follow people by public key or NIP-05 identity.<\/li>\n<\/ol>\n<p><!-- ttd-bulk:nostr-start:end --><\/p>\n<p><!-- ttd-bulk:nostr-meshtastic-link:start --><\/p>\n<p>For off-grid communication, also see <a href=\"https:\/\/thethriftydev.com\/blog\/meshtastic-build-your-own-off-grid-mesh-network\/\">the Meshtastic off-grid mesh network guide<\/a>.<\/p>\n<p><!-- ttd-bulk:nostr-meshtastic-link:end --><\/p>\n<p><!-- ttd-bulk:nostr-email-capture:start --><\/p>\n<div class=\"ttd-inline-email-capture\">\n<p><strong>Get the Nostr Starter Checklist<\/strong><\/p>\n        <div class=\"ttd-abn ttd-abn-inline\" data-variant=\"E\">\n            <button class=\"ttd-abn-close\" type=\"button\" aria-label=\"Close newsletter signup\">\u00d7<\/button>\n            <div class=\"ttd-abn-kicker\">TheThriftyDev Dispatch<\/div>\n            <strong>De-Google Without Going Crazy<\/strong>\n            <p>Get the practical escape map: search, email, cloud files, photos, browser, phone backups, and what to replace first.<\/p>\n            <form class=\"ttd-abn-form\">\n                <input type=\"email\" name=\"email\" placeholder=\"you@example.com\" required aria-label=\"Email address\">\n                <input type=\"hidden\" name=\"variant\" value=\"E\">\n                <button type=\"submit\">Send the escape map<\/button>\n            <\/form>\n            <small>No spam. Practical privacy, AI, backup, and tool drops. Unsubscribe anytime.<\/small>\n            <div class=\"ttd-abn-result\" role=\"status\" aria-live=\"polite\"><\/div>\n        <\/div>\n        <\/div>\n<p><!-- ttd-bulk:nostr-email-capture:end --><\/p>\n<p><!-- ttd-bulk:mandatory-id-phones-social-media-nostr-breadcrumbs:start --><\/p>\n<nav class=\"rank-math-breadcrumb ttd-breadcrumb\" aria-label=\"Breadcrumb\">\n<p><a href=\"https:\/\/thethriftydev.com\/\">Home<\/a> <span class=\"separator\">\/<\/span> <a href=\"https:\/\/thethriftydev.com\/blog\/\">Blog<\/a> <span class=\"separator\">\/<\/span> <span class=\"last\">Mandatory ID Is Coming for Phones and Social Media. Here\u2019s How to Move to Nostr Before the Gate Closes<\/span><\/p>\n<\/nav>\n<p><!-- ttd-bulk:mandatory-id-phones-social-media-nostr-breadcrumbs:end --><\/p>\n<p><!-- ttd-bulk:mandatory-id-phones-social-media-nostr-related-posts:start --><\/p>\n<h2>Related Posts<\/h2>\n<ul>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/fcc-wants-your-id-to-activate-a-phone-privacy-is-dead\/\">FCC Wants Your ID to Activate a Phone \u2014 Privacy Is Dead<\/a><\/li>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/meshtastic-build-your-own-off-grid-mesh-network\/\">Meshtastic: Build Your Own Off-Grid Mesh Network<\/a><\/li>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/private-ai-developer-edge-venice-ai-2026\/\">Private AI Is Becoming the New Developer Edge: Why Venice AI Fits the 2026 Shift<\/a><\/li>\n<\/ul>\n<p><!-- ttd-bulk:mandatory-id-phones-social-media-nostr-related-posts:end --><\/p>\n<p><!-- ttd-context-links:start --><\/p>\n<div class=\"wp-block-group\" style=\"border:1px solid rgba(14,165,233,.35);padding:18px;border-radius:16px;background:linear-gradient(135deg,#0f172a,#111827);color:#e5e7eb\">\n<h2 style=\"color:#fff;margin-top:0\">Keep building from here<\/h2>\n<p>These related guides continue the same thread with practical next steps:<\/p>\n<ul>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/privacy-hub\/\">Privacy and Digital Rights Hub<\/a><\/li>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/fcc-wants-your-id-to-activate-a-phone-privacy-is-dead\/\">FCC Wants Your ID to Activate a Phone \u2014 Privacy Is Dead<\/a><\/li>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/meshtastic-build-your-own-off-grid-mesh-network\/\">Meshtastic: Build Your Own Off-Grid Mesh Network<\/a><\/li>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/google-ai-search-privacy-alternatives\/\">Google AI Search Privacy: Better Alternatives to Protect Your Searches<\/a><\/li>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/private-ai-developer-edge-venice-ai-2026\/\">Private AI Is Becoming the New Developer Edge: Why Venice AI Fits the 2026 Shift<\/a><\/li>\n<li><a href=\"https:\/\/thethriftydev.com\/blog\/run-your-own-ai-beginners-guide-local-llms-2026\/\">Run Your Own AI: The Beginner\u2019s Guide to Local LLMs in 2026<\/a><\/li>\n<\/ul>\n<\/div>\n<p><!-- ttd-context-links:end --><\/p>\n<p>Views: 3<\/p>","protected":false},"excerpt":{"rendered":"<p>Mandatory ID for phones and social media is coming. Why it matters, how Nostr is different, and how to move your online life before the gate closes.<\/p>\n","protected":false},"author":1,"featured_media":403,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,4,63],"tags":[29,32,25,33,27,30,28,31,24,26],"class_list":["post-404","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy","category-strategy-mindset","category-tutorials","tag-anonymous-speech","tag-censorship-resistance","tag-decentralized-social-media","tag-digital-sovereignty","tag-fcc-kyc","tag-first-amendment","tag-mandatory-id","tag-meshtastic","tag-nostr","tag-privacy","entry"],"_links":{"self":[{"href":"https:\/\/thethriftydev.com\/blog\/wp-json\/wp\/v2\/posts\/404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thethriftydev.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thethriftydev.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thethriftydev.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thethriftydev.com\/blog\/wp-json\/wp\/v2\/comments?post=404"}],"version-history":[{"count":13,"href":"https:\/\/thethriftydev.com\/blog\/wp-json\/wp\/v2\/posts\/404\/revisions"}],"predecessor-version":[{"id":539,"href":"https:\/\/thethriftydev.com\/blog\/wp-json\/wp\/v2\/posts\/404\/revisions\/539"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thethriftydev.com\/blog\/wp-json\/wp\/v2\/media\/403"}],"wp:attachment":[{"href":"https:\/\/thethriftydev.com\/blog\/wp-json\/wp\/v2\/media?parent=404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thethriftydev.com\/blog\/wp-json\/wp\/v2\/categories?post=404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thethriftydev.com\/blog\/wp-json\/wp\/v2\/tags?post=404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}