https://github.com/nostr-protocol/nips/blob/master/26.md

Reply to this note

Please Login to reply.

Discussion

Interesting, thanks. Would it be similar to bip-85 in the sense that multiple keypairs can be created based off the root keypair, with no way to reverse engineer a compromised delegated keypair to find the root?