Frostr

Frostr's avatar
Frostr
npub17uvd...8tr4
Stay frosty
Here's a diagram I made for NIP-46 signing flow with Frostr... - nostr client sends nip46 request to relay - igloo server listens for nip46 request - approves - passes to other signer (igloo-cli) for partial sig - gets response from cli and completes sig - passes back to relay - nostr client receives signed note and publishes to relays All of thise happens within like 2 seconds wtf image
Key rotation is done manually still - you need the threshold of shares within that keyset (2/3 for example) locally in order to recover the nsec, this does not happen over nostr in some fancy protocol manner (only signing does) shares are only valid within a keyset meaning that if you have a 2/3 and you lose a share IF you destroy the other 2 shares than the third stolen share is ORPHANED. So to rotate at this time the steps are: - Recover nsec with threshold of shares - Use that nsec to generate a new keyset (can be any threshold) - DESTROY the shares in the old keyset TLDR; DESTROY AND OPRHAN image View quoted note →
Key rotation is done manually still - you need the threshold of shares within that keyset (2/3 for example) locally in order to recover the nsec, this does not happen over nostr in some fancy protocol manner (only signing does) shares are only valid within a keyset meaning that if you have a 2/3 and you lose a share IF you destroy the other 2 shares than the third stolen share is ORPHANED. So to rotate at this time the steps are: - Recover nsec with threshold of shares - Use that nsec to generate a new keyset (can be any threshold) - DESTROY the shares in the old keyset TLDR; DESTROY AND OPRHAN image View quoted note →