Replies (18)

Dikaios1517's avatar Dikaios1517
NIP-46 is the best option for delegation, in my opinion, because you can have a lot of control over exactly what event kinds the NIP-46 provider may automatically sign, automatically reject, or ask every time for, whereas an actual private key that has been authorized to sign on behalf of a mastwr key would need a note somewhere on the relays indicating not only that the delegated key can sign on behalf of the master key, but what sorts of event kinds it is permitted to sign for. That's not to mention the immense amount of complexity key delegation would add to Nostr. I provided some links to dev discussion of the issue and why it atill hasn't become a thing on Nostr here: View quoted note →
View quoted note →
If I had to do it myself from my ignorant savant point of view: I'd want a 3-2-1 sort of thing on my profile. (3 backups, 2 mediums and 1 remote location.) To validate my key today in a sovereign way, I have nip-05. Gimme 2 more ways, one in a different medium and one in a remote location. Which.. I could have: a secondary nip-05 different locations, check. The one outside the internet is harder to parse automagically. Unless of course I could gather my homies around a 40, a blunt and have them unfollow my old key and follow my new one. Different medium, check. Likely all of the above has been tested and disproved, but who knows?
i proposed a scheme for separating identity from authorization in a manner similar to web sessions. this lets you better protect your actual identity key, avoids guessing whether a rotation was valid, can be verified without external requests, and in the event of loss is basically the same as bulk nip-09 deletions
I agree the inability to do key rotation in Nostr is a major concern. It’s one of several things that make me sometimes think of making a derivative protocol that fixes some of the problems that have cropped up with Nostr. So far I’ve resisted the temptation. View quoted note →
A single key per person and for life is too core to how the protocol works. Everything is built on top of that. It's the core of the core of the core. Rotate-able subkeys are a non-starter. All you've got is a bunker-esque solution or a protocol fork.
...Also pretty nuts that graperank-flavored WoT can solve nostr's "big scary nsec problem". Although I'm kind of an extremist here - I don't think there is much subjective WoT can't solve. Trust is humanity's superpower; welding it onto global-scale networks and lightspeed information transfer is..... unimaginable.