That is an opinion editorial via Shinobi, a self-taught educator within the Bitcoin house and tech-oriented Bitcoin podcast host.
I counsel, sooner than studying this, that you just learn the prior article I wrote explaining what Nostr is and the way it works at a prime degree. You must then have a good suggestion of the core design of the gadget at that time, so now let’s check out most probably issues which might be going to happen because it grows in adoption. With the platform turning into a well-liked one for the Bitcoin group, those issues are ones to concentrate on.
As I mentioned within the prior article, consumer public/non-public key pairs are integral to how Nostr works as a protocol. There are not any usernames, or any form of identifiers {that a} relay server is in regulate of, to affiliate to person customers. It’s merely the ones customers’ keys which might be totally below their regulate.
This purposes as a decent binding between the real consumer and the way they’re known via others that forestalls any relay server from unbinding the ones two issues, i.e., giving any person’s identifier to any other consumer. This solves some of the largest elementary issues of platforms used for communique between other folks: the loss of regulate over customers’ personal identities. However it additionally introduces the entire issues of key control that any person possessing a personal key runs into. Keys will also be misplaced and keys will also be compromised and if such an match have been to happen, customers haven’t any one to visit for help, similar to with Bitcoin. There is not any buyer toughen to get better anything else. You lose it, that is it.
That is going to inevitably necessitate a scheme for customers to rotate from one keypair to any other in some way this is verifiable and discoverable for different customers that they have interaction with in the course of the protocol. All of the protocol is based totally round proving that an match got here from a particular consumer (id key), so all of the ones promises pass out the window as soon as any person’s keys are compromised.
How do you take care of that? Simply pass take a look at their Twitter account? Neatly, then that is not an overly decentralized gadget, in the end, should you require the use of a centralized platform the place they aren’t in regulate in their id to make sure their Nostr id.
Produce other customers attest to the legitimacy of a brand new key? That does not cope with scenarios equivalent to mass key compromises, or no longer figuring out someone with regards to them neatly sufficient to believe their attestation.
Nostr wishes a real cryptographic scheme tying the rotation of 1 key to any other. There’s a proposal from developer fiatjaf for a elementary scheme that might probably remedy this factor. The fundamental concept could be to take a protracted set of addresses derived from a unmarried grasp seed, and create a suite of “tweaked” keys very similar to how Taproot timber are dedicated to a Bitcoin key. Taproot takes the Merkle tree root of the Taproot tree and “provides” it to the general public key to create a brand new public key. This will also be replicated via including that Merkle tree root to the non-public key with the intention to reach the matching non-public key for the brand new public key. Fiatjaf’s concept is to chain commitments going backwards from the tip to the start in order that every tweaked key would if truth be told include an explanation that the following tweaked key used to be used to create it.
So, believe beginning with key Z, the final one within the chain. You may tweak this with one thing, after which pass backwards and create a tweaked model of key Y the use of the tweaked Z key (Z’ + Y = Y’). From right here you could take Y’ after which use it to tweak X (Y’ + X = X’). You may do that all of the as far back as key A, to get A’, and from there, start the use of that key. When it’s compromised, the consumer can broadcast an match containing the untweaked key A and tweaked key B’. This is able to include the entire information had to display B’ used to be used to generate A’, and customers may straight away forestall following A’ and apply B’ as a substitute. They might know definitively that B’ is that consumer’s subsequent key and to apply that as a substitute.
This proposal nonetheless has some issues although. First, you need to generate the entire keys you could ever use forward of time and it has no option to rotate to an entire new set of keys. This might be handled via committing to a grasp key on this scheme that might notarize such rotations, or just producing an overly massive set of keys from the start. Both trail could be a sound direction to take, however in the end will require protecting a root key or key subject material protected and best exposing person hotkeys to Nostr purchasers.
This scheme, then again, does not anything to offer protection to customers or be offering a mechanism for id restoration within the match that the basis key subject material is misplaced or is itself compromised. Now, this is not to mention that there is not any get advantages to fiatjaf’s scheme, there completely is, however you must make the purpose that no answer solves each and every drawback.
To hold forth a little on possible answers right here, believe as a substitute of a series of tweaked keys like he proposes, {that a} key’s tweaked with a grasp chilly key that should even be used to signal the development rotating from one key to any other. You’ve got key A’, which is derived via including A and M (the grasp key), and the rotation match could be A, M and B’ (generated via including B and M) with a signature from M. M generally is a multisig threshold key — two of 3, 3 of 5, and many others. This is able to probably upload redundancy towards loss in addition to supply a protected mechanism for key rotation. This opens the door as neatly to the use of services and products to assist in restoration, or spreading a few of the ones keys round to relied on buddies. It gives the entire identical flexibility as multisig does with Bitcoin itself.
NIP26 may be a suggestion which may be very helpful in dealing with this drawback. This specifies a protocol extension to occasions permitting a signature from one key to authorize any other key to put up occasions on its behalf. The “token,” or signature evidence of delegation, would then be incorporated in all occasions posted via the second one public key at the first’s behalf. It may well also be time restricted in order that delegation tokens routinely expire and must be renewed.
In the end, then again it’s solved, this drawback has to be solved for Nostr in the long run. A protocol based totally totally on public/non-public key pairs getting used as identities can’t achieve traction and adoption if the integrity of the ones identities can’t be secure and maintained for customers. That finally will boil right down to having to continuously use out-of-band and centralized platforms to make sure new keys and coordinate other folks following your new id when one thing is misplaced or compromised, and at that time, the ones different platforms grow to be a way to sow confusion and have interaction in censorship.
Problems with key control and safety are giant issues of an overly massive design house stuffed with industry offs and ache issues, however they’re issues which might be going to must be solved throughout the context of Nostr for it to paintings. In my subsequent article, I will be able to summarize some problems that I see cropping up with regard to relay server structure and scaling problems that Nostr builders must confront given the fundamental information buildings that Nostr is constructed on.
For someone studying and questioning why I have not discussed decentralized identifiers (DIDs): Sure, that may be a possible strategy to those issues that, for my part, is relatively complete. Then again, Nostr builders appear very hesitant to combine DIDs into the protocol or purchasers because of the truth that it might create exterior dependencies out of doors of the Nostr protocol. Should you aren’t aware of how DIDs paintings on a technical degree and have an interest, this newsletter via Degree 39 is a really well written summarization of ways they paintings.
This can be a visitor put up via Shinobi. Evaluations expressed are totally their very own and don’t essentially replicate the ones of BTC Inc or Bitcoin Mag.