Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 5
Generated: 14:18:42
Login to reply

Replies (5)

This exact problem has been solved by email and PGP about 30 years ago. Basically you generate a master key from which you derive service keys that you can eventually announce (using the master key signature) that they should no longer be trusted at some point. This reduces exposure since only service keys are defacto used on NOSTR applications while the master key is ever so rarely used for retiring older service keys and announce a new one for that user.
2025-11-27 09:03:46 from 1 relay(s) ↑ Parent 2 replies ↓ Reply
so you need a nip-85 provider to say if you can do social migration, if you can't do it you can say that your key is compromised so without tagging any pubkey and using a different kind. cc: nostr:npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z
2025-11-28 11:10:10 from 1 relay(s) ↑ Parent Reply
You are correct and such a drastic change wouldn't be feasible either. What about if this is an optional feature? Those with existing keys can continue using them, this would be optional and available for users that have benefit/need of key rotation. Wouldn't impact existing users, wouldn't impact current way of nsec/npub. Would just state that npubABCDXYZ has authority to "expire" a key and define the successor.
2025-12-01 11:05:24 from 1 relay(s) ↑ Parent Reply