Avatar
franzap
726a1e261cc6474674e8285e3951b3bb139be9a773d1acf49dc868db861a1c11
Building nostr:npub10r8xl2njyepcw2zwv3a6dyufj4e4ajx86hz6v4ehu4gnpupxxp7stjt2p8 and #purplestack | BA šŸ‡¦šŸ‡·

GM!

#FreeAssange

Replying to Avatar Guy Swann

There should be a key change NIP for Nostr.

Could be interesting too if you had it so that you had designated accounts to confirm a key change too. Like I would use my brother nostr:npub1ajv7m32k0cpgzha32qszsh304qusjvwwmavus0ttktzldms4xzusuftppj and maybe nostr:npub1rxysxnjkhrmqd3ey73dp9n5y5yvyzcs64acc9g0k2epcpwwyya4spvhnp8 or someone else I know really well in the space as ā€œtrusted verifiers.ā€ Then if my key ever got stolen, even though both myself and the hacker could sign, I could make it so only I could transfer it to a new key by asking my verifiers to sign.

Maybe that’s too convoluted, but I feel like there should be a key cycling method regardless.

We need this

nostr:note1rwnxgwc2xr7z2wv6zmfjnn9cds9zdu2qf0z7rkp3vfrsf5cz267s84k3lu

Replying to Avatar JeffG

nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft (who else) had one that I’m not sure was ever merged but is in use. It involves creating an event defining a future key you might need to rotate to and then open timestamping that event to ā€œnotarizeā€ the time.

I have some sort of odd mental block on remembering the number or the site on this one but I’m sure Pablo can fill in the blanks.

This is the latest spin on that idea: https://github.com/nostr-protocol/nips/pull/1032

"Social proof(optional): the event contains a list of people that the master keypair attaches to the revocation certificate as `p` tags. These pubkeys are designated as trusted identities that can judge/signal if the new proposed identity is trustworthy or not"

Replying to Avatar Guy Swann

There should be a key change NIP for Nostr.

Could be interesting too if you had it so that you had designated accounts to confirm a key change too. Like I would use my brother nostr:npub1ajv7m32k0cpgzha32qszsh304qusjvwwmavus0ttktzldms4xzusuftppj and maybe nostr:npub1rxysxnjkhrmqd3ey73dp9n5y5yvyzcs64acc9g0k2epcpwwyya4spvhnp8 or someone else I know really well in the space as ā€œtrusted verifiers.ā€ Then if my key ever got stolen, even though both myself and the hacker could sign, I could make it so only I could transfer it to a new key by asking my verifiers to sign.

Maybe that’s too convoluted, but I feel like there should be a key cycling method regardless.

Working on it, I hope to have an MVP soon! 🫔

Replying to Avatar elsat

nostr:npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9

nostr:note1rmwpc3m9j7nxy6ctq3tk4mv6t4qehgf8gv66lhyy0daw8yye6nas0sq9sf

šŸ˜‚ on it

Nostr-based app store. To install anything - not just nostr apps.

The whole technical foundation developed/backed by the same company that strongly prefers the cathedral approach? Not sure

GM

Holepunch/Pear tech is cool. They wrote everything including a runtime.

For some reason I think it will struggle to get traction with developers. I hope I'm wrong.

Fuck these psycopaths

nostr:note1yjzw99k743hfu25rz49dpr22hypxpx7s76xvz77ecvcxpf5mpqespxhw0s