I’m going to assume you need the 2FA to decrypt your key

Reply to this note

Please Login to reply.

Discussion

If so, it will have no sense, of course.

On the other hand, if it could be used as a second layer proof?🙄 But then any activity should be signed with both the private key and TOTP, I believe. And also it is questionable if you can have several authenticatee relays...

So it will make no sense, or?

Dunno, you should propose a NIP on how your idea should work. This is an open protocol and I don’t have all the answers 🤓

Thank you, I see 🫂

Even though I never coded anything more complex than a 'Hello world' message, I'll dig into this topic and maybe even propose a NIP 🤙

Have a great weekend ☀️