accountless.eth pfp
accountless.eth
@accountless.eth
“EOA key still needs to be stored” 😂 man. it’s hard having critical views of 7702 bc it’s so favored. it’s a band aid. and we need more folks talking ab it and holding us accountable.
1 reply
0 recast
0 reaction

jxom  pfp
jxom
@jxom
It doesn’t need to be “stored” though :)
1 reply
0 recast
0 reaction

accountless.eth pfp
accountless.eth
@accountless.eth
i’m excited to see solutions. “forgetting they key” is also weird to me. i know there is no ideal and all avenues have tradeoffs. i just want us to be able to say, ya we aren’t solving root causes and are just designing around eoa limitations.
1 reply
0 recast
0 reaction

jxom  pfp
jxom
@jxom
why is it weird? if it's a post-quantum concern, then the issue is orthogonal as majority of multisig & execution signers are not PQ safe right now.
3 replies
0 recast
1 reaction

jxom  pfp
jxom
@jxom
sure we can easily upgrade signers on SCA to be PQ-safe, but this wouldn't suffice because everything else would be screwed, so we need a backwards compatible way to secure the vulnerable keys.
1 reply
0 recast
0 reaction

accountless.eth pfp
accountless.eth
@accountless.eth
pq isn’t my concern and upgrading signer in sca still requires eoa that cannot rotate so — it just seems illogical and literally opposite of what any good security practitioner would devise. why does signal messenger rotate keys for our chats? why is that the level of security they aim for? it’s not bc of how the network scales or keys work. it’s a conscious choice.
0 reply
0 recast
0 reaction