nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqrhtejt4qaj76wjqvamf4wjxrv4tfzyeu33u2l9rl6fpfnku0fq0sy3m7m7 nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq2qez4j3dhqgz9nfwnwm437gm8tgmrcvk6qj5yv0g6x7wrkvhksmqcdgsm3 I know that. I generated a key using 1Password, and it worked well there and on my Raspberry Pi. I just couldn't get it to work anywhere else.
Discussion
I'm curious, why do you want to use a closed source application for your security? IMO that comprises your setup in a completely unbounded manner. You essentially rely on what the company claims the software does. That shouldn't be acceptable if you are securing really critical information.