Ok, so I get it conceptually but how will it actually work do you think?
IT team provisions the keys and gives out... ? Usernames and passwords? Bunker URLs? Java cards?
Ideally in a way that both
- allows use of all the apps in the ecosystem, and
- passes user acceptance test.
Your thoughts?
Login to reply
Replies (2)
My noob-idea is having two servers, one controlled by the business, one controlled by a Nostr-service, that provide a working bunker URL together.
I think playing with a set up like that can maybe even get us to *only the user* ever having the full nsec. In a way that has some proper UX for everyone involved.
It's a tricky one.