Yeah I need to see how it works to implement it.
Is nip 46 the best approach?
Yeah I need to see how it works to implement it.
Is nip 46 the best approach?
There is a world where we add one key share into Amethyst and another one on Amber so no app has the full nsec and thus cannot leak it alone.
For that one, I think we might need new NIP-55 methods.
Otherwise, for one key on the phone and one key in the cloud setups, NIP-46 should be good.