Looks to me a little bit like a reinvention of NIP-26. How is this different? Does it solve the problems that caused NIP-26 to essentielly get scrapped?
Rotating nostr keys, without any protocol changes.
This is a complete spec with vectors and three matching implementations. If you see a flaw, I want to hear it.
https://github.com/GHOST-UntraceableDigitalDissident/cold-root-identity
Discussion
Fair comparison but this does not delegate authority or introduce permissions or revocation logic. CRI just anchors rotating keys to a single offline root via a deterministic signature that clients can verify with no protocol changes.