CryptoBudha
    Demo
    What's Hot

    What Does a Risk Analysis Say About Splintershards (SPS) Friday? – InvestorsObserver

    February 4, 2023

    Crypto Mining Co. To Swap 27,000 Rigs To Wipe $38M Debt – Law360

    February 4, 2023

    Takashi Murakami to Release Collection of 13 NFTs Linked to Physical Hublot Watches – CoinDesk

    February 4, 2023
    Facebook Twitter Instagram
    • ABOUT US
    • CONTACT US
    • TERMS OF SERVICES
    Facebook Twitter Instagram
    CryptoBudha
    • Home
    • Cryptocurrency

      FBI seizes $100K in NFTs from scammer following ZachXBT investigation – Cointelegraph

      February 4, 2023

      $20K Bitcoin may return, says analyst as US unemployment hits 54-year low – Cointelegraph

      February 3, 2023

      First Mover Asia: Bitcoin Dips Into Red but Holds Strong Above $23.5K – CoinDesk

      February 3, 2023

      Coinbase stock jumps 20% after federal securities suit dismissed

      February 2, 2023

      Bitcoin spikes above $24K as Fed chair Powell talks of ‘disinflation’

      February 2, 2023
    • Blockchain

      Protocol Labs, Chainalysis and Bittrex add to crypto layoff season – Cointelegraph

      February 4, 2023

      As Avalanche Price Explodes, These 3 Altcoins Might 20x in 2023 – Cryptonews

      February 3, 2023

      OpenSea serves as an example of why crypto security must improve – Cointelegraph

      February 3, 2023

      Senate Banking Committee’s priorities for new Congress include crypto: Report

      February 2, 2023

      One of Europe’s biggest ever crypto events, Block 3000: Blockchain Battle goes live

      February 2, 2023
    • ICO

      Creators Of Andreessen Horowitz-Backed Cryptocurrency Filecoin … – Forbes

      February 4, 2023

      5 of the Best Crypto ICOs Set To Soar in 2023 – BeInCrypto

      February 3, 2023

      ICOBID (ICOB) Rises 4.36% Thursday: What's Next for This Neutral Rated Crypto? – InvestorsObserver

      February 3, 2023

      Shiba Inu Price Prediction as SHIB Gets Accepted on New Virtual Prepaid Card – Time to Buy?

      February 2, 2023

      Celsius was cheating investors ‘from the start’ claims audit • The Register

      February 2, 2023
    • NFT

      Takashi Murakami to Release Collection of 13 NFTs Linked to Physical Hublot Watches – CoinDesk

      February 4, 2023

      Logan Paul Faces Class Action Lawsuit Over Alleged CryptoZoo NFT Rug Pull – CryptoPotato

      February 3, 2023

      Hublot, Takashi Murakami Unveil Unique Rainbow Gemstone Watch, NFT – Forbes

      February 3, 2023

      Giant Bitcoin ‘Taproot Wizard’ NFT Minted in Collaboration With Luxor Mining Pool

      February 2, 2023

      Chainlink (LINK) Keeping Eye on NFTs, Check Out Reason

      February 2, 2023
    • Metaverse

      Heated metaverse bubbles could mean troubles – Opinion … – China Daily

      February 4, 2023

      Partner reality – what you need to know about the Metaverse – ComputerWeekly.com

      February 3, 2023

      Meta is shutting down the Metaverse platform it recently bought – MIXED Reality News

      February 3, 2023

      OKX and Manchester City stars launch immersive metaverse fan experience

      February 2, 2023

      WEMADE and Metagravity Sign Strategic Alliance MOU to Collaborate on Blockchain Games for the Metaverse

      February 2, 2023
    • More
      1. Analysis
      2. Regulations
      3. Mining
      4. View All

      What Does a Risk Analysis Say About Splintershards (SPS) Friday? – InvestorsObserver

      February 4, 2023

      What Does a Risk Analysis Say About Pascal (PASC) Thursday? – InvestorsObserver

      February 3, 2023

      What Does a Risk Analysis Say About YFDAI.FINANCE (YF-DAI) Thursday?

      February 2, 2023

      Ethereum Price Hits $1,700 and ETH Is Poised For More Upsides

      February 2, 2023

      “My Big Coin” Crypto Founder Gets Eight Year Jail Sentence – Regulation Asia

      February 4, 2023

      New Jersey Wants Its Own BitLicense Regulation | Lowenstein … – JD Supra

      February 3, 2023

      US Judge Dismisses Customer Lawsuit Against Crypto Exchange … – Bitcoin News

      February 3, 2023

      ‘Something must be done!’ The crypto regulatory challenge for 2023

      February 2, 2023

      Crypto Mining Co. To Swap 27,000 Rigs To Wipe $38M Debt – Law360

      February 4, 2023

      Today in Crypto: Ethereum to Activate Zhejiang Testnet Next Week … – Cryptonews

      February 3, 2023

      Marathon’s first Bitcoin sale in 2 years not the result of distress – Cointelegraph

      February 3, 2023

      BankProv no longer offering loans backed by crypto mining rigs

      February 2, 2023
    CryptoBudha
    Home»Cryptocurrency»Solving Nostr Key Management Issues – Bitcoin Magazine
    20220926_good-gdog-proof-collaborative-custody-multisig-by-will-schoellkopf_.png
    Cryptocurrency

    Solving Nostr Key Management Issues – Bitcoin Magazine

    adminBy adminJanuary 17, 2023No Comments7 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email

    This is an opinion piece by Shinobi, a self-taught educator in the Bitcoin space and tech-minded Bitcoin podcast host.

    before reading this In a previous article, I wrote an article explaining what Nostr is and how it works at a high levelAt that point, you should have a good idea of ​​the core design of your system. So let’s take a look at the issues that can arise as recruitment progresses.platform and Become popular with the Bitcoin communitythese issues are something to be aware of.

    As explained in the previous article, a user’s public/private key pair is integral to the way Nostr functions as a protocol. There is no username associated with an individual user or any kind of identifier controlled by a relay server. It’s just those users’ keys that are completely under your control.

    It acts as a tight coupling between the actual user and how the user is identified by other users, and the ability of the relay server to uncouple the two (i.e. give someone’s identity to another user). ). This solves one of the biggest underlying problems of platforms used for communication between people: the user’s inability to control her identity. But it also brings with it all the key management problems that people with private keys encounter. Keys can be lost or compromised, and in the event of such an event, users have no one to turn to for help, just like Bitcoin. No customer support to recover anything. You lose it, that’s all.

    This necessarily requires a scheme to rotate from one keypair to another in a way that is verifiable and discoverable by other users with whom the user interacts via the protocol. The entire protocol is based on proving that an event is from a specific user (the identity key), so all these guarantees are void if someone’s key is compromised.

    how do you handle that? Check out their Twitter account. Well, in the end, if you have to use a centralized platform that doesn’t control identities to verify Nostr’s identities, it’s not a very decentralized system.

    Have other users attested to the new key? This does not address situations such as large-scale key compromise or not knowing who is close enough to trust their certificate .

    Nostr requires a real cryptographic scheme that ties the rotation of one key to another.there is Suggestion from developer fiatjaf For a basic scheme that could potentially solve this problem. The basic idea is to take a long set of addresses derived from a single master seed and create a series of “tuned” keys similar to how Taproot trees are committed to Bitcoin keys. Taproot takes the Merkle tree root of the Taproot tree and “appends” it to the public key to create a new public key. This can be duplicated by appending the root of that Merkle tree to the private key to obtain the private key corresponding to the new public key. Fiatjaf’s idea is to chain commitments backwards from last to first so that each reconciled key actually contains evidence that the next reconciled key was used to create it. is to

    So imagine starting with the last key in the chain, the Z key. Tweak this with something, then go backwards and create a tweaked version of key Y using the tweaked Z key (Z’ + Y = Y’). Get Y’ from here and use it to tweak X (Y’ + X = X’). Trace this back to key A to get A’ and start using that key from there. If compromised, the user can broadcast an event containing key A before tuning and key B’ after tuning. It contains all the data necessary to show that B’ was used to generate A’, allowing the user to quickly unfollow A’ and follow B’ instead. increase. They clearly know that B’ is the user’s next key and follow that instead.

    However, this proposal still has some problems. First, you have to pre-generate all the keys you want to use, and there is no way to rotate to an entirely new set of keys. This can be addressed by committing such rotations to a master key for this scheme that can be notarized, or by generating a very large set of keys from the start. Either method works, but ultimately you should keep your root key or key material safe and only expose your individual hotkeys to Nostr clients.

    However, this scheme does not protect the user or provide a mechanism for identity recovery if the root key material is lost or itself compromised. This is not to say that fiatjaf’s scheme is without merit. It’s definitely worth it, but it’s important to stress that there is no one-size-fits-all solution.

    To highlight a possible solution here a bit, instead of a chain of coordinated keys as he suggests, it should also be used to sign the event of rotating from one key to another Imagine adjusting keys with a master cold key. We have a key A’ that is derived by adding A and M (the master key), the rotation events are A, M, and B’ (generated by adding B and M), and the signature from M there is. M is the multisig threshold key — 3 of 2, 5 of 3, etc. This potentially adds redundancy against loss and provides a secure mechanism for key rotation. This also opens the way for you to use the service to assist in recovery, or spread some of those keys to trusted friends. We provide everything.

    NIP26 is also a very helpful suggestion for dealing with this issue. It specifies an event protocol extension to allow a signature from one key to authorize another key and post an event on its behalf. A “token” or signature proof of delegation is included in all events posted by her second public key on behalf of the first public key. A time limit can also be set so that delegation tokens automatically expire and must be renewed.

    Ultimately, no matter how it is resolved, the problem is have It will be resolved for Nostr in the long term. Protocols based entirely on public-private key pairs used as identities will not gain traction and adoption if the integrity of these identities cannot be protected and maintained for users. Ultimately it means having to constantly use an out-of-band centralized platform to validate new keys and coordinate who follows new identities when something is lost or compromised, and that At that point, those other platforms become vehicles for sowing chaos. Engage in censorship.

    Key management and security issues are big questions in a very large design space full of trade-offs and pain points, but these issues need to be solved in context for Nostr to work. In the following article, given the underlying data structures Nostr is built on, I’ll explore some of the issues I see with regards to the relay server architecture and scaling issues that Nostr developers have to face. Summarize.

    For those wondering why I didn’t mention distributed identifiers (DID): Yes, in my opinion this is a potential solution to these problems, and a very comprehensive one. am. However, Nostr developers seem very reluctant to integrate DID into their protocol or client. This is because it creates an external dependency for the Nostr protocol. If you’re not familiar with how DID works on a technical level and are curious, This article by Level 39 Very well put together on how they work.

    This is a guest post from Shinobi. Opinions expressed are entirely his own and do not necessarily reflect those of his BTC Inc or Bitcoin Magazine.

    censorship resistance opinion private key Social media technical
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    admin
    • Website

    Related Posts

    FBI seizes $100K in NFTs from scammer following ZachXBT investigation – Cointelegraph

    February 4, 2023

    $20K Bitcoin may return, says analyst as US unemployment hits 54-year low – Cointelegraph

    February 3, 2023

    First Mover Asia: Bitcoin Dips Into Red but Holds Strong Above $23.5K – CoinDesk

    February 3, 2023

    Coinbase stock jumps 20% after federal securities suit dismissed

    February 2, 2023
    Add A Comment

    Leave A Reply Cancel Reply

    banner
    Top Posts

    Subscribe to Updates

    Get the latest sports news from SportsSite about soccer, football and tennis.

    Advertisement
    Demo
    About Us:

    Your source for the serious news. cryptobudha is crafted specifically to exhibit the lest crypto related News. Visit our main page for more News or contact us

    Email : timeaustralian@yahoo.com

    We're social. Connect with us:

    Facebook Twitter Instagram
    Latest Posts

    Tencent Joins Metaverse Race With New Extended Reality Department

    June 23, 2022

    Franklin Templeton unveils metaverse ETF

    September 6, 2022

    Dvision Network & Game.Fi.org Partnering for Metaverse Adoption

    July 29, 2022
    Get Informed

    Subscribe to Updates

    Get the latest creative news about the crypto world .

    Facebook Twitter Instagram Pinterest
    • ABOUT US
    • CONTACT US
    • TERMS OF SERVICES
    © 2023 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Subscribe
    Get the latest creative news about the crypto world.

    We are using cookies to give you the best experience on our website.

    You can find out more about which cookies we are using or switch them off in settings.

    CryptoBudha
    Powered by  GDPR Cookie Compliance
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

    Strictly Necessary Cookies

    Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

    If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.