Ok, so I get it conceptually but how will it actually work do you think?

IT team provisions the keys and gives out... ? Usernames and passwords? Bunker URLs? Java cards?

Ideally in a way that both

- allows use of all the apps in the ecosystem, and

- passes user acceptance test.

Your thoughts?

Reply to this note

Please Login to reply.

Discussion

My noob-idea is having two servers, one controlled by the business, one controlled by a Nostr-service, that provide a working bunker URL together.

I think playing with a set up like that can maybe even get us to *only the user* ever having the full nsec. In a way that has some proper UX for everyone involved.

It's a tricky one.