Looks to me a little bit like a reinvention of NIP-26. How is this different? Does it solve the problems that caused NIP-26 to essentielly get scrapped?

Reply to this note

Please Login to reply.

Discussion

Fair comparison but this does not delegate authority or introduce permissions or revocation logic. CRI just anchors rotating keys to a single offline root via a deterministic signature that clients can verify with no protocol changes.