Replies (1)

taylor's avatar
taylor 2 weeks ago
Well not really, because that just divides an nsec into multiple secret shares. They still add up to that nsec, so if that nsec were compromised, then it is compromised. Related, I wrote a sketch of a NIP proposal that offers a solution using FROST, but it isn't sufficient without what I named "Chain of Governance"