Why Nostr? What is Njump?
2024-05-17 22:01:19
in reply to

Daniel Wigton on Nostr: Encrypted in a distributed filesystem. Distributed between your own devices and any ...

Encrypted in a distributed filesystem. Distributed between your own devices and any backup agreements you have with close contacts.

Most application specific keys would be unlocked as needed by a bearer token from authorized applications. Even if they had access to your key file they could only get the keys they are already authorized to use, and which will expire anyway.

The master key would get unlocked by a passphrase or similar that you train people to never actually use, unless they are rotating keys. Kind of like how cert chains work.

1) Bob creates a master keypair
2) Bob immediately creates and signs domain specific keypairs, communication, banking.
3) Bob locks his master keypair with a key derived from a passphrase and a server key for his parent device and an on device nonce.
4) Bob uses his domain specific keys to create application specific keys.
5) Bob befriends Alice
6) Alice agrees to be a sort of notary for Bob. They do a key exchange that Bob uses to re-encrypt his master key instead of the server key.
7) Bob deletes the nonce on his key server thereby locking his original key file forever.
8) Bob can now only unlock the new key file by repeating the key exchange with Alice.

I am somewhat making this up as I go, but I have thought about it a good deal in the past. You can specify the key derivation however you want and do it as many times as you want. This way Bob could require help from Alice AND Alicia for additional security or Alice OR Alicia for flexibility. You could do N out of M friends from a trusted list.

You just don't want people to have to know that is what is happening. All of the above is automated.

There would need to be some careful UI choices on your trusted friends devices so even if Bob is completely compromised, the attacker would have to convince Alice they were really Bob in person. Maybe that feature only works via nearfield communication etc.

To keep Bob from just going to Alice to help rotate his keys and reclaim his account the attacker would have to compromise Alice as well. Under and N out of M scheme (death happens) it would get pretty difficult.
Author Public Key
npub1w4jkwspqn9svwnlrw0nfg0u2yx4cj6yfmp53ya4xp7r24k7gly4qaq30zp