Interesting, if I understand this correctly:
1) the trade-off is basically about how much time to allocate. Balancing the potential leak damage (timespan) versus nsec access frequency (how often to create epoch keys).
2) this basically gives me (or the nostr client) a temporary key to protect instead of using the nsec for each event.
Have other solutions been proposed? If so, why weren't they implemented?
(
)
View quoted note →

Untraceable Digital Dissident
Cold Root Identity for Nostr: How Epoch Keys Fix the Hot Key Problem
Nostr identities break when a single hot key leaks. This guide shows how cold root keys, deterministic derivation, and rotating epoch subkeys creat...