Thats quite interesting and might play nicely with my prototype of ZK and bip-85 hierarchical nostr keys

https://github.com/wujifoo/nostr-bip-85-prototype

The zk can assert ownership/relationship of another key, doesn't help if the root is compromised though. So ideally you would never use the root for anything other than generating other keys. (Which can also do the same)

Reply to this note

Please Login to reply.

Discussion

No replies yet.