I still think nsecs should be disposable. Instead of guarding it like your life depends on it, would be best to have an ability to recover via some sort of porting (when a key is created, have it delegate another recovery key or something). This way you don't need to be so careful and if one leaks, have the ability to recover from the other (at the same time delegating a new key).

What's wrong with this thinking? Am I overlooking something? Or is this just technically not possible?

Reply to this note

Please Login to reply.

Discussion

Think this is correct and quite necessary for the key system to work. Hope to see it soon

I see people proposing signing devices and not connecting key to internet. This is insane ask imo. People are NOT going to jump through that hoop. I bet if you looked at 2FA hardware usage it's probably a tiny percentage.

Yeah for sure. Hardware signing is cool for the tech enthusiasts and innovators, but obviously too high friction for any service you want to be constantly connected with.

I think the flaw in practice is that clients and relays need to be aware of the deprecation of a key. if it's a timed key, maybe doable.

But there's no garantee that, for instance, a stolen key won't be used for evil. The deprecation proof is not guaranteed to reach every client.

also, a timed deprecated key may still be used to sign back-dated notes which may or may not be a serious attack.

This is the point I was trying to make. One single point of reking is my problem. You're essentially describing a multisig type scenario or 2FA. I'm not sure exactly what to compare it to because it seems somewhat novel to me.

Maybe have a recovery key that never goes online that generates a private signing key that is used in a hot way, but that can be used to generate an entirely new signing key while simultaneously invalidating the other.

Removing the damage caused during the reking is an entirely different issue, but at least people won't just have entire identies rugged for services with no ability to recover.

Imagine the fallout of never being able to regain access at all. Much more damage could be done (scams, reputational damage, trolling, etc).

Of course, this still requires absolute offline security of the recovery seed or whatever, but that is more inline with the training and systems we already have in place for Bitcoin. We could simply extend functionality of hardware wallets to Nostr.

So, essentially what you are describing here.

#Bitcoin bulls are setting their sights on $69K highs ahead of the April halving🚀

Do you think you'll get to 69k by April?

If you haven’t Join the RB VIP group already, I would highly recommend joining now https://t.me/+7VPgqXtSUJo1MmRk,super underrated newsletter and extremely 100x pump signals OG Bitcoiners, join now to change the dynamic with us.

💯