Dream flow: buy new phone, enter 12 words, done. Everything's set up, including my config, apps, contacts, etc. The 12 words are my nsec in this case ofc.

Replies (61)

Would be nice to use 12 words and a passphrase, then repeat with another passphrase to have a nice decoy phone. In case of coercive physical attack you would (temporary) lose controlo of your identity, but at least funds and data would remain safe.
i think one of the next steps is to get a hardware company to develop something like this. I wonder if Android is programmable enough to pull this off.
Planned for zap.store: automatic backups of your installed apps, optionally encrypted. So maybe not the phone config, but apps and contacts definitely possible to restore with npub/nsec. Baby steps. First major release coming next week. View quoted note →
If you meant it even automatically copies and pastes the key you use for backup into nostr, then no it doesn't do that yet. So create the app yourself. It'll be fairly easy.
These 12 words might be as sensitive (if not more) than the words that allow me to send #bitcoin. They're the seed phrase for my digital identity, which is tied to rw identity. The downstream interactions are far more complex than something used to write txs on a timechain. If someone gets my bitcoin seed phrase, all that money in that wallet is gone; they can impoverish me. Someone gets my nsec, they can *be* me, which could be worse. What can guard against this? Something like this:
Your digital identity should NEVER be that critical to keep private. There should always be a way to restart using a real life meeting.
Sats Germain's avatar
Sats Germain 1 year ago
Part of why I like buying a new phone is because it DOESN'T have the mess I left on the old one...
Easy to do if you have a third party involved (they just record your config) What I want is for this setup without a trusted third party and connecting to my own server.
Gerardo's avatar
Gerardo 1 year ago
👀👀 this would be awesome
DZC's avatar
DZC 1 year ago
"relays", ofc 🫂
What would happen if you accidentally entered your nsec on a compromised website, application or device?
We would also like this a lot. It's been getting harder and harder to get new backdoors.
The phone recovery 12 words are BIP-85 from the one true key that you protect, everything else is recoverable through derivation paths. One seed to rule them all.
Default avatar
Egon 1 year ago
Key protection is key, and much easier said than done imho.