Global Feed Post Login
Replying to Avatar fiatjaf

What if the company owner could split his key that he generated on the phone into 3 shards and give each shard to a different cloud service providers and they would collectively perform musig2 and sign stuff on his behalf using NIP-46 without ever being able to recover their key unless they all collude?

And they also offer fine-grained access control for interns and employees and so on.

nostr:npub1vadcfln4ugt2h9ruwsuwu5vu5am4xaka7pw6m7axy79aqyhp6u5q9knuu7 is this ok?

Avatar
Gigi 1y ago

#asknostr

nostr:nevent1qqs04nnajz8yh24alhfzrwtsnj8mmpv28lcfrcq8ku7d5zz45n7s97qpzamhxue69uhhyetvv9ujuurjd9kkzmpwdejhgtczyqalp33lewf5vdq847t6te0wvnags0gs0mu72kz8938tn24wlfze6qcyqqqqqqgc3ymlq

Reply to this note

Please Login to reply.

Discussion

Avatar
average_bitcoiner 1y ago

https://conduition.io/cryptography/frost-byok/

Close

Thread collapsed
Avatar
Tim Bouma 1y ago

As a first pass, I'd model it like DNSSEC. The delegator (parent) has a DS record (event) having the delegatee (child) pubkey. Additional tags could be added for specific delegations.

Thread collapsed