Replies (25)

πŸ‘»'s avatar
πŸ‘» 2 weeks ago
If I don't understand what the interface is doing, and that's most of the time, then I'd rather not lol
someone's avatar
someone 2 weeks ago
you are not practicing safe nsecs! :) if nostr is going to become eventually 'No Other Social Trust Required' we have to be mindful of where we paste it because WoT algos may depend on us.
lkraider's avatar
lkraider null 2 weeks ago
Interesting, but why deterministic epoch labels instead of time beacons? Seems like a foot gun in which one could store future keys in an app (maybe a greedy app) and get those stolen, or if an attacker gets ahold of your HSM as oracle they could pre-gen your future identities. And since the protocol always accepts the latest created_at identity, a far future one would also always override the current one. I understand there are tradeoffs, and I am not sure if liveness was a design goal, but seems to me a non-deterministic time beacon could offer benefits here, plus a clear time boundary rule too. Otherwise, I would suggest including these guardrails: 1) Explicitly recommend apps/users never pre-generate/store future epoch private keys; derive only the current epoch on the hot device; keep root strictly offline. 2) Add client-side created_at sanity checks.
Except the nsec has to be the same by design. A password of a different app is not related.
At this point I'm afraid to paste it into my own app that I'm making TBH. Seen the follow lists get nuked way too many times lol
taylor's avatar
taylor 2 weeks ago
that doesn't seem good enough for a business that loses it's livelihood. Maybe there should be a NIP where someone can say "this pubkey was mine until X date"?
taylor's avatar
taylor 2 weeks ago
Well not really, because that just divides an nsec into multiple secret shares. They still add up to that nsec, so if that nsec were compromised, then it is compromised. Related, I wrote a sketch of a NIP proposal that offers a solution using FROST, but it isn't sufficient without what I named "Chain of Governance"
↑