I feel like this process and many variations of it (for example, the NIP-41 and NIP-109 proposals) can all be described in the same NIP and be supported in various degrees, with different security models for different people.
The NIP-41 idea can only be done by people that are very serious about their key security, while NIP-109