Testing an old idea: NFC-based transient accounts: accounts that log off as soon as the app goes to the background, deleting all traces of the account from the phone.
It looks like this in debugging speeds:
If you are an activist and if your phone is confiscated, they will never find anything on the phone. Not even your public key.
Walk around with Amethyst installed and an NFC tag hidden in your clothing. When you need to use Amethyst, tap the tag, insert your password and login. Lock the screen to delete everything.
The NFC has a NIP-49 password-encrypted nsec. If you need, destroy and dispose the NFC tag.
Login to reply
Replies (66)
This is awesome!
love it
It has some very meaningful use cases.
great idea
Testing an old idea: NFC-based transient accounts: accounts that log off as soon as the app goes to the background, deleting all traces of the account from the phone.
It looks like this in debugging speeds:
If you are an activist and if your phone is confiscated, they will never find anything on the phone. Not even your public key.
Walk around with Amethyst installed and an NFC tag hidden in your clothing. When you need to use Amethyst, tap the tag, insert your password and login. Lock the screen to delete everything.
The NFC has a NIP-49 password-encrypted nsec. If you need, destroy and dispose the NFC tag.
View quoted note →
Dope wallpaper! (Also cool idea)
amazing 😮
Amazing features for privacy and security. I wish more service and app would have the same, user could pass boarder with almost empty phone, and login everything on the other side. Password manager would be one of the must app to have this.
Testing an old idea: NFC-based transient accounts: accounts that log off as soon as the app goes to the background, deleting all traces of the account from the phone.
It looks like this in debugging speeds:
If you are an activist and if your phone is confiscated, they will never find anything on the phone. Not even your public key.
Walk around with Amethyst installed and an NFC tag hidden in your clothing. When you need to use Amethyst, tap the tag, insert your password and login. Lock the screen to delete everything.
The NFC has a NIP-49 password-encrypted nsec. If you need, destroy and dispose the NFC tag.
View quoted note →
Yes! Amazing. Do you know how big the encrypted payload would be? The Ntag 216, the most recent are 800 ish bytes.
Also, what kind of ndef record would this be?
You can create one for your key in the left/drawer / export keys. Choose the password enrypted version. It's quite small.
Interessante, mas onde isso seria mais útil?
👀
Testing an old idea: NFC-based transient accounts: accounts that log off as soon as the app goes to the background, deleting all traces of the account from the phone.
It looks like this in debugging speeds:
If you are an activist and if your phone is confiscated, they will never find anything on the phone. Not even your public key.
Walk around with Amethyst installed and an NFC tag hidden in your clothing. When you need to use Amethyst, tap the tag, insert your password and login. Lock the screen to delete everything.
The NFC has a NIP-49 password-encrypted nsec. If you need, destroy and dispose the NFC tag.
View quoted note →
This Cypherpunk future is going to be awesome.
Upload contents of entire phone then delete. The ability to dump one message
Wow amazing
Se me ocurre en Venezuela donde después de las elecciones estaban requisando los móviles para ver si las personas escribían cosas contrarias al gobierno. Habrá más ejemplos donde podría ser útil.
I never realized you cared so much about these things. It makes me really happy to see your focus on such important issues.
Really cool!
Feature request, rather than decrypting the key with the password, it should be like a seed passphrase. It would allow you to have deniability, with a decoy profile in case authorities force you to decrypt that NFC tag.
With NIP-49 it is possible for authorities to know you gave them a wrong password (or the data on the NFC tag is corrupted). But a wrong passphrase will just lead you to a another nsec, where you can put some decoy notes.
Yeah decoys would be awesome!
God the things we have to develop to secure our freedom! 😎
@Mike Dilger ☑️ did you think about decoy nsecs in the NIP-49 spec using the wrong password?
I can't find the event you are replying to, so I will answer in general.
No I did not think about that. If you enter the wrong password the decryption will fail, it won't give a decoy nsec.
Holy moly this is an interesting concept.
That's really cool.
Wouldn't it be better to have the NFC tag sign the event, keeping the key material even out of memory?
So I don't understand why one would use this, but I hope anyone here can explain to me why this would be useful and who it is useful for?
#AskNostr
The key is deleted from memory. This is not to avoid loading the key, but avoid storing it in the device for other people to find.
wen biometric encrypt/decrypt ncryptsec?
To export/create the ncrypt sec? It should already ask for it 🤔
i mean so you don't have to enter a password. could you use the biometric API to create the ncryptsec and also to decrypt it?
Humm... Interesting... It would only work in that specific phone though. 🤔
that's fine. i can just use a password manager to keep track of all my different ncryptsecs. UX would be nice. tap NFC and then just scan my face to get in.
or just label the NFC chips so i know which phone they are for
That is sick 💪
What’s nfc?
Pro-tip: You can implant an NFC chip in your palm.
View quoted note →
Great idea!
passwords in general shouldnt be decrypted but encrypted only and match the resulting hash.
i've seen password decription and comparing the plain result so much
Very cool!
View quoted note →
That is fucking amazing!!
I'd vote up for that option. The password-encrypted NFC is easy enough to use on any phone and to write. Cheap prices per unit and basically any wearable nowadays can be a hidden NFC tag.
This would make it very hard to even find the NFC, let alone decrypt the key afterwards when it is done right.
Good idea. Nevertheless it should be in a password format so that it can be typed by the user and given to authorities without raising attention as an anomaly.
This is wild.


Testing an old idea: NFC-based transient accounts: accounts that log off as soon as the app goes to the background, deleting all traces of the account from the phone.
It looks like this in debugging speeds:
If you are an activist and if your phone is confiscated, they will never find anything on the phone. Not even your public key.
Walk around with Amethyst installed and an NFC tag hidden in your clothing. When you need to use Amethyst, tap the tag, insert your password and login. Lock the screen to delete everything.
The NFC has a NIP-49 password-encrypted nsec. If you need, destroy and dispose the NFC tag.
View quoted note →
Wow.
Testing an old idea: NFC-based transient accounts: accounts that log off as soon as the app goes to the background, deleting all traces of the account from the phone.
It looks like this in debugging speeds:
If you are an activist and if your phone is confiscated, they will never find anything on the phone. Not even your public key.
Walk around with Amethyst installed and an NFC tag hidden in your clothing. When you need to use Amethyst, tap the tag, insert your password and login. Lock the screen to delete everything.
The NFC has a NIP-49 password-encrypted nsec. If you need, destroy and dispose the NFC tag.
View quoted note →
So cool! That idea had many other uses too!
Near Field Communication. Nearly every smartphone has this nowadays.
badass!
View quoted note →

Another way would be request pin when opening the app and the possibility of setting up a duress pin (GrapheneOS inspiration) so if I type duress PIN all data is erased.
Altgought not sure if it would solve the same problem.
Features overview | GrapheneOS
This plus ecash stored in relays are two of the most innovative ideas I’ve seen lately.
Very cool and useful idea
that's an interesting concept. i like it.
Interessante o conceito principalmente pensando em biochip.
Como tenho um NFC implantado ( biochip da Dangerous Things ) ter a chave dentro do NFC e carregando a conta.
Curti a idéia, vou acompanhar
I have this biochip. As soon as he mentioned NFC, I immediately thought of this type of application—reading a specific command on the chip that grants access to the app.
This idea could be applied more broadly to the device itself. i.e- unlock the phone with the NFC tag and it opens to your regular home screen, all apps and data accessible, etc. Unlock it with a passcode only (as if forced to do so by authorities), and it opens to a basic screen with minimal apps that you don't even use.
This would seem to be a trivial undertaking for a GrapheneOS dev to come up with
Pretty cool!
Wow!!! 👀
Your identity in a NFC Tag!!! (password protected)
+
(True) Incognito mode for Amethyst!!
@Vitor Pamplona you are really killing it! 👍
Testing an old idea: NFC-based transient accounts: accounts that log off as soon as the app goes to the background, deleting all traces of the account from the phone.
It looks like this in debugging speeds:
If you are an activist and if your phone is confiscated, they will never find anything on the phone. Not even your public key.
Walk around with Amethyst installed and an NFC tag hidden in your clothing. When you need to use Amethyst, tap the tag, insert your password and login. Lock the screen to delete everything.
The NFC has a NIP-49 password-encrypted nsec. If you need, destroy and dispose the NFC tag.
View quoted note →
Would it make sense to do this in a pre-High Level OS environment such as UEFI to then allow a boot path with one session or another depending on if the the NFC tag was authenticated only during that boot attempt?
I didn't know this function yet.
Pretty cool!
Love this idea
YES
Interessante faz tempo ouvia alguem falar disso 🤔
NFC-based transient account
Testing an old idea: NFC-based transient accounts: accounts that log off as soon as the app goes to the background, deleting all traces of the account from the phone.
It looks like this in debugging speeds:
If you are an activist and if your phone is confiscated, they will never find anything on the phone. Not even your public key.
Walk around with Amethyst installed and an NFC tag hidden in your clothing. When you need to use Amethyst, tap the tag, insert your password and login. Lock the screen to delete everything.
The NFC has a NIP-49 password-encrypted nsec. If you need, destroy and dispose the NFC tag.
View quoted note →
I wonder if this is already possible with user profiles on Graphene OS. If the authorities aren't aware of the way to switch users...you can probably just create user profile with a bare bones setup (normie apps and home screen) that don't actually log you into anything.
Yeah, it's possible to boot the phone into a bare Owner profile and then use the Guest profile for real, but this is simple enough for authorities to figure out because it's literally in the settings menu.
