SEC-06 Report: Identity & Signers

Humans need better key management. For machines, keys are the only path to autonomy.
SEC-06 Report: Identity & Signers

SEC-06: Identity & Signers Report

Introduction

It’s been a couple of months since SEC-06 wrapped on March 20th. And as its said, better late than never. This was our first three-week focused sprint on the hard questions of everything identity & signers. About 21 people - roughly half alumni and half new faces - showed up in Madeira to tackle one sharp problem: keys are great, but key management is a disaster.

After SEC-05, it was clear that identity in the world of AI would matter a lot. We wanted to talk to our LLMs and have them make payments. Just before the cohort, Openclaw blew up, and the Clankers needed to talk to humans and to each other. The legacy stack does this with phone numbers, OAuth, API keys, payment processors, and a million KYC hoops. With a Nostr plugin, a clanker generates its nsec, sets up its wallet, and starts DMing and zapping in one prompt, in minutes, by itself.

Humans need better key management. For machines, keys are the only path to autonomy.

On the last day of the cohort, Pip the WoT guy published an analysis of about 16,000 leaked nsecs. No NIP-41 in the wild, no rotation, no way to tell the network “this isn’t me anymore”. Today, any key compromise is fatal.

Themes & Projects

Identity & Key Management

Identity continuity was the hot topic and was attacked from multiple angles: cryptographic rotation, social recovery, and checkpoint events, building legitimacy over time. Gzuuus’ OpenContinuity (NIP #2278) is already moving through review - identity continuity on Nostr is observer-dependent, so the draft standardizes claims and evidence, not truth. The PR thread is worth reading.

Signers & Bunkers

hzrd’s article on signer UX sucks struck a cord and we highly recommend it. Florian’s testbed picks the middle between approving everything (fatigue) and nothing (security facade): per-event-kind flows with risk-tuned warnings.

Payments & Wallets

One of the most fruitful demos was on Silent Payments, and it came from a non-dev.

AI Agents & Memory

Kosh’s Nomen gives agents searchable memory on Nostr - sleep-style consolidation, turning raw chats into named memories that travel with the npub.

Web of Trust

Gzuuus extended Relatr with an ELO scripting language, so trust scores become user-defined plugins: write the rule, post it as a Nostr event, and anyone can run it.

Storage & Streaming

Blossom kept settling in as the default object store with Nostr as the coordination layer.

  • Flower market (Tom) - Blossom server discovery with challenge-response retention proofs

  • Blossom Fire (Tom) - Phone-to-web live streaming via Blossom + Nostr

  • Nostube (Florian) - Video client on Nostr + Blossom

Network & Discovery

FIPS and ContextVM continued to mature as Nostr-native transports underneath the app layer.

  • FIPS ( @bbb5d...e2747 ) - Two-Tollgate demo; Wi-Fi/Ethernet failover; Nostr relay as first FIPS-native app

  • FIPS over Nostr (Sats And Sports) - FIPS nodes self-announcing topology over Nostr

  • CSH (Yo) - SSH over ContextVM; web terminal tunneled through Nostr

  • Antenna Tracker ( @c3e23...7caa9 ) - ESP32 antenna tracker; MCP-over-Nostr control

Privacy, Tools & Learning

Nostr identities for things adjacent to social: voting, duress signals, trust-bound releases.

  • Auditable Voting (Alex / c0brador) - Cashu-mint coordinator voting with multi-coordinator cross-checks

  • Silent Alarm ( @404d9...42fe7 ) - BIP-85 duress PIN sends SOS via NIP-17 with GPS

  • Software signing (Arjen) - Nostr-signed reproducible releases from GitHub Actions across untrusted workers

Talks & Workshops

  • Identity is Prismatic ( @6e468...eee93 ) - Riffing on Chris Poole’s “high-order bit” talk: “posting as” vs “posting to”. Build things on Nostr that map our many selves rather than collapse them into one.

  • Engineering with Nostr is Better (Tom) - E-bike-company case studies; Nostr identities simplifying production engineering.

  • Openclaw + NIP-17 in a Prompt (Gigi) - Workshop: agent spins up its own Nostr identity and DMs humans in one prompt.

  • Tuesday talks - “Bitcoin doesn’t care what any of us want” (Karliatto), WoT + social recovery + SSS (Tom/Yo/Gzuuus), Governance in Nostr (Gzuuus).

Experiments in SEC-06

  • Three-week format: A bit short - the cohort really starts grooving by Week 3 after 2 weeks of warmup. Still useful since not everyone can do a full cohort.

  • Outdoor BBQs: BBQs after hikes worked well. Tricky to find hike + BBQ spots in rainy spring weather, but we did.

Paths Forward

Identity continuity isn’t optional. Thousands of keys have been exposed, and serious adoption hasn’t even started. SEC-06’s complementary paths - cryptographic, social, hardware-rooted - are still experiments and need serious effort. Until Nostr has continuity baked in, it can’t be a serious social layer where normal people invest their time and energy. This is a big reason contributing to the difficulty of using Nostr for them. Derek has a point, even though we don’t fully agree. The thing is, people don’t like responsibility, and Nostr isn’t for everybody. But let that not be an excuse for bad UX.

Trust should be configurable - Relatr’s ELO-plugin model is a step in the right direction.

Nostr is perfect for agents: identity, money, network, communications. The clankers are here and we’d like to see more of Nostr for the agentic world.

Closing Notes

SEC-06 wouldn’t have happened without our participants at full tilt for three weeks, the captains (Yo, Florian, Gzuuus), @cdebf...4236c for the BBQs and Ponchas, the ladies at the Cowork, @5b705...1efe5 for the space, and @6e468...eee93 for the heart he keeps putting into this.

We owe SEC-06 alumni an Arrr. We also owe everyone the SEC-07 report, coming next.

Upcoming Cohort

Applications are open for SEC-08: YOLO++ running from 20 July - 28 August in Madeira. Apply here.

Yer keys be yer flag, laddies. Lose ‘em an’ ye’re a ghost on the high seas. Rotate ’em proper, or get plundered.**

More: sovereignengineering.io | No Solutions


Write a comment
No comments yet.