Global Feed Post Login
Replying to Avatar GHOST

They’re hot only because clients force them to be. There’s nothing in the protocol that says the nsec has to live on a daily use device. That’s just UX inertia.

The protocol just says: A user has a keypair. Everything else is implementation detail.

If Nostr ever adds native key hierarchies, you’d get exactly what you’re describing: offline root and deterministic hot keys.

What I’d like to see is epoch rotation on top of that. Treat the nsec as an offline root that never touches a live client, and use it only to deterministically derive the ‘hot’ operational keys you actually use for a given epoch (year, quarter, whatever). Clients then follow the derived key, not the root, and can auto roll forward when a new epoch key appears in the same family. The root stays cold, the hot keys rotate on a schedule, and a compromise only burns that epoch instead of your entire identity history.

A modernized key hierarchy model:

Root nsec (offline, cold)

-> deterministic derivation

-> epoch subkeys (hot, operational)

-> clients follow epochs

-> rotation becomes normal, safe, automatic

This is the same key lifecycle model used everywhere else encryption has matured.

Avatar
Alexander Hoff ❍ 1mo ago

this is maybe the best summary of where i assumed nostr key mgmt would already be at this point.

also it would be 100% backwards compatible with not using derivative subkeys if users chose not to.

Reply to this note

Please Login to reply.

Discussion

No replies yet.