Why are we all so concerned with securing our one-and-only nsec? Wouldn’t it be healthier for nostr if we could easily burn them and migrate to the next one?

Key migration should be as easily possible as: “Hey, I’m Joe, Fred lost his phone, this is his new number.”

Everyone can ask themselves then: do I trust Joe.

How to set this up technically may be challenging assuming there’s no hard concept of absolute time in nostr which allows for the statement “key burned after”. But intuitively I feel there must be a pragmatic middle path with relative time as in “signed and referenced by”. We could make a DAG putting notes into timely relation to each other and drop out cheaters. A bit like proof-of-stake with social media:

nostr:npub1m4ny6hjqzepn4rxknuq94c2gpqzr29ufkkw7ttcxyak7v43n6vvsajc2jl could for example make a statement now “schmijos seems legit and every interaction with him so far seems legit”. Others could judge this and say: ok, there this side of the DAG which seems non-meddled-with. A bit like a continuous key-signing party which doesn’t bring good security, but some security. This is a concept of time. And as soon as nostr:npub1m4ny6hjqzepn4rxknuq94c2gpqzr29ufkkw7ttcxyak7v43n6vvsajc2jl detects weird interactions, she makes a statement: “nah, doesn’t seem right, he’s been hacked”. It would be no different than me writing to a friend on facebook: “hey your account makes weird things, I consider it has been hacked”

I’m aware this idea is neither very cypherpunk nor Bitcoiner-proof but on nostr we could maybe live with a very laax term of time? We’re still free to assume the worst anytime and can require perfect security when needed. But if I want to call Fred I’m probably grateful that Joe told me where to reach him.

Reply to this note

Please Login to reply.

Discussion

I made the same suggestion, to burn an npub, but it didn't really gain traction.

1. What was this again? I remember that I didn’t like a certain aspect about it.

2. How do you search for it now and find it?

I have no idea.

I have my money on social recovery/rotation for what it's worth.

If a few close friends report the account as compromised, for example, and say "this is their new npub" - clients could easily pick up on it.

there has been no case of compromised keys that i am aware of, i'm curious to know if there has been though

also, wen nip-06 in clients and signers ffs

Can't get your keys back from some clients.

yes, web clients are bad mkay, only use alby/nos2x/amber

all good client devs should just remove in-app signing, period nostr:npub1ye5ptcxfyyxl5vjvdjar2ua3f0hynkjzpx552mu5snj3qmx5pzjscpknpr *nudge*

also, my conservative instinct about using clients has been vidicated repeatedly

losing your keys is just the tip of teh iceberg... having your follow lists and relay lists clobbered is another problem that comes up

Did I just write that time is a social construct? Partially. The scientific aspect is called “vector time”.

Your suggestion works fine. There are no problems with it. It just works™

But, no joke, deep down I want an overengineered cypherpunk solution that crushes people who misunderstand the tech 😮‍💨

I don't see why you would have any sort of process to "burn" keys. We can have infinite amounts of them. Old keys would just become dormant. It's like a phone number but we have infinite amounts of the.

certificate chaaiinnnsssss :)