Key rotation is super easy, at least if you have a strong co...

npub1jvxvaufrwtwj79s90n79fuxmm9pntk94rd8zwderdvqv4dcclnvs9s7yqz
hex
9d661beead19f10e5408bb6f645a6ef0ba9a849080936c9370fe6756ca506fd8nevent
nevent1qqsf6esma6k3nugw2sytkmmytfh0pw56sjggpymvjdc0ue6kefgxlkqprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsfxrxw7y3h9hf0zczhelz57rdajse4mz63kn38xu3kkqx2kuv0ekg337fufKind-1 (TextNote)
↳ Reply to Technical Debt (npub14w4qnk43lsllls2qnldj3vfcxtx5qvtsf3xlvxv9yha8afrxhmfqju3rwx)
Fair point, but nostr:npub16xnpfx85k8wzdhctang6860g3u64lds5kac73ddjwlg0lxdg9g3su56z6l has cooked a key rotation mechanism for nostr. The problem is t...
Key rotation is super easy, at least if you have a strong consistency database to read from like DNS nameservers. Key revocation is the hard part, for example what happens if you give your nsec to a bunker, and it leaks, how do you recover from that? You can't do that without a Blockchain but it is hard to explain why. Try to study Farcaster IDs they did a good job explaining their key management targets
Raw JSON
{
"kind": 1,
"id": "9d661beead19f10e5408bb6f645a6ef0ba9a849080936c9370fe6756ca506fd8",
"pubkey": "930ccef12372dd2f16057cfc54f0dbd94335d8b51b4e2737236b00cab718fcd9",
"created_at": 1776709025,
"tags": [
[
"e",
"861170a0d3153c48e2b55c8a9f7de1f46950993ee424843f071d07c4d6cfcbfa",
"wss://nos.lol/",
"root",
"930ccef12372dd2f16057cfc54f0dbd94335d8b51b4e2737236b00cab718fcd9"
],
[
"e",
"5edac2f8d48e2f7561dd9d274e735c8ff6d6bf91c44ac8a6ac189d6820eb1d87",
"wss://relay.damus.io/",
"reply",
"abaa09dab1fc3fffc1409fdb28b13832cd4031704c4df6198525fa7ea466bed2"
],
[
"p",
"50809a53fef95904513a840d4082a92b45cd5f1b9e436d9d2b92a89ce091f164"
],
[
"p",
"d1a61498f4b1dc26df0becd1a3e9e88f355fb614b771e8b5b277d0ff99a82a23"
],
[
"p",
"abaa09dab1fc3fffc1409fdb28b13832cd4031704c4df6198525fa7ea466bed2"
]
],
"content": "Key rotation is super easy, at least if you have a strong consistency database to read from like DNS nameservers. Key revocation is the hard part, for example what happens if you give your nsec to a bunker, and it leaks, how do you recover from that? You can't do that without a Blockchain but it is hard to explain why. Try to study Farcaster IDs they did a good job explaining their key management targets",
"sig": "a3aaae3384605703913d23440b18236983905912d9e54f69193a05badd88ce90dcaf3aa7bbaed788bf769dba42d62df3c05bf30b82e559fbb2e5926d466b2a76"
}