Of course, photos cannot be owned unless you keep them to yourself which makes them useless.
But this idea compared to traditional auth has these benefits:
1. You can host anywhere.
2. Data is encrypted at rest, so no leaks from unauthorized hackers.
3. You own the keys at all times, never share.
Downside would be that potentially large data is being sent back and forth from your nsec bunker server.
That is, if I understand the nsec bunker model correctly.
You wouldn't use the nsec bunker to host the images though, just identity delegation
Please Login to reply.
But don't you send the encrypted content to the bunker and have it return the decrypted content?
It's a remote signer, not a storage appliance