Your Private Key Is Not a Password: The Case for External Signers
Why pasting your nsec into apps is a security nightmare and why you need Amber
by Alien Investor
────────────────
On Nostr, you are not a row in a tech giant’s database. You are a cryptographic key.
Your private key (nsec) is your voice, your identity, and your reputation. Whoever holds this key, is you.
Yet, most users — especially those valuing convenience — commit digital harakiri daily. They copy their nsec from a password manager and paste it directly into apps like Primal or Damus.
It works, but from a security architecture perspective, it is a nightmare.
Here is why your password manager hits its limits here, and why you urgently need to switch to a dedicated signer like Amber.
────────────────
The Problem: Your “Login” Is Actually a Surrender
When you “log in” to a Nostr app by pasting your key, background processes occur that you need to understand.
- The Clipboard is a Public Marketplace. A password manager is built to store secrets securely. But to use them, it must decrypt them and pass them to the operating system — usually via the clipboard.
There is malware designed solely to scan the clipboard for strings starting with nsec1.... If you use cloud-based keyboards (like Gboard or SwiftKey), your clipboard contents often end up in the cache or cloud servers of Google or Microsoft.
- The “Hot Wallet” Trap. Once you paste the key into a client app, the app must store it so you aren’t asked for it with every like. This means a complex social media app with millions of lines of code, image parsers, and constant internet access has permanent access to your most important secret.
If a hacker finds a vulnerability in the client (e.g., via a manipulated image), they can theoretically extract your key. You have turned your client into a “Hot Wallet.”
────────────────
The Solution: Amber and the Concept of “Signers”
Amber is a Nostr Event Signer for Android. The app does exactly one thing: It guards your key and signs things for you — but it never reveals the key.
The Difference: Secret vs. Signature.
The Old Way (Client has the key): You give the client your entire checkbook and sign blank checks. The client can do anything at any time.
The Signer Way (Amber): The client comes to you with a filled-out check (an event) and asks: “Can you please sign this?” Amber verifies it, signs it cryptographically, and returns only the signature. The key itself never leaves Amber.
Technically, this works via NIP-55 (Android Intents). The client app never knows what your private key looks like; it only knows your public key (npub).
“Amber is like a hardware wallet running as software on your phone. It isolates the secret from the app that connects to the internet.”
────────────────
Why Amber Is Safer Than Your Password Manager
Many think: “Doesn’t an extra app increase the attack surface?” False. In this case, it is the opposite. It is called compartmentalization.
No Internet Access for the Key. You can (and should) revoke Amber’s internet access in Android settings. An app that cannot “phone home” cannot steal your key, even if it were compromised. A social client, by definition, must be online.
Android Keystore & Biometrics. Amber utilizes the Android Keystore System. Where possible, your key is processed in a dedicated security chip (Titan M, StrongBox). Additionally, you can secure every signature with a fingerprint. Even if someone steals your unlocked phone and opens Primal, they cannot post anything because Amber demands your biometric authorization.
────────────────
The “Legacy” Question: Is My Key Already Burned?
A common objection: “I created my account directly in Primal. The key was already online. Is it worth switching?”
The answer is a clear YES.
It is about Future Protection. If Primal was compromised in the past, that is a historical risk. But by migrating now, you protect yourself against future attacks.
If a malicious update is pushed tomorrow, or a new vulnerability is exploited, your key is no longer there. The attack hits a void. You degrade the client from the “owner” of your identity to a mere “user” of it.
────────────────
How to Migrate Properly (The “Primal Nuke”)
Simply logging out is often insufficient, as data remnants can persist in storage. Here is the clean path to sovereignty:
-
Verify Backup. Ensure you have your
nsecwritten down securely (offline, on paper/metal). Without a backup, you lose access. -
Install Amber. Download Amber (preferably via F-Droid or GitHub to verify the source).
-
Import Key. Enter your
nsecinto Amber. Immediately enable biometric locking (fingerprint). -
The “Nuke”. Do not just log out of your client. Go to Android Settings → Apps → Primal → Storage → Clear Data. This forces Android to physically purge the app’s storage area.
-
Restart via Signer. Open the “fresh” client. When logging in, do NOT select “Enter nsec.” Select “Log in with external signer” (often a key icon).
-
Authorize. Amber will open and ask for permission. Confirm it. Done.
You are now using the client merely as an interface. Your key lies securely in the vault of Amber.
────────────────
Verdict: Reclaim Your Authority
Convenience is the enemy of security. Copy-pasting private keys is a bad habit from the Web2 world that we must discard.
Migrating to a signer like Amber effectively transforms your smartphone into a “Hardware Wallet Light.” You trade a systemic risk (key in clipboard and app) for a hardened architecture.
Even if it takes five minutes: Do it. Your digital identity is worth it.
────────────────
The Nostr Sovereignty Series
The Foundation: How to start correctly. The Sovereign Protocol: Architecture of an Unconfiscatable Digital Identity https://primal.net/Alien-Investor/the-sovereign-protocol-architecture-of-an-unconfiscatable-digital-identity
The Proof: How to get verified without permission. The Silver Badge: Immortalize Your Nostr Identity https://primal.net/Alien-Investor/the-silver-badge-immortalize-your-nostr-identity
The Economy: Escaping the walled gardens. Nostr Zap Store: Attacking the App Store Monopoly https://primal.net/Alien-Investor/nostr-zap-store-attacking-the-app-store-monopoly
────────────────
Money, power, Bitcoin — and OPSEC. I write about financial sovereignty, privacy, and cybersecurity in a world built on control. More at alien-investor.org (German only)👽