The Case for Custodial Nostr: Why Teams Should Stop Fighting the Lost War
Organizations already delegate key custody internally. A server-side Nostr client with permission management would be faster, stabler, and more honest than relay-dependent remote signing hacks.
The Nostr community has a problem it refuses to name. Every few months, someone builds another elaborate contraption for team key management, and every few months these contraptions fail to gain traction outside a small circle of enthusiasts. The pattern is unmistakable: NIP-26 delegation got deprecated, nsecBunker remains a niche tool for technical users, Amber works for individuals but requires your phone to be perpetually online for team use, and Keycast, despite being well-engineered, inherits all the latency and fragility of the NIP-46 architecture it builds upon.
The reason these solutions struggle is not that their developers lack skill. The reason is that they are solving the wrong problem. They attempt to preserve individual self-custody principles in contexts where those principles create friction without corresponding benefit.
Consider what happens when a marketing team wants to post from an organization's Nostr identity. With current solutions, an employee opens a client, which generates a signing request, which gets encrypted and sent to a relay, which delivers it to whatever device holds the nsec, which decrypts it, signs it, encrypts the response, sends it back through the relay, where the client finally receives permission to publish the event. This round-trip happens for every single action. Post a note? Round trip. React to something? Round trip. Update a profile? Round trip. Fetch encrypted messages? Round trip for each one.
This architecture made sense for its original purpose: allowing individuals to use their keys from multiple devices without exposing the nsec to each device. The relay acts as a communication channel between your phone (holding the key) and your laptop (running the client). For personal use with reasonable latency tolerance, it works.
But teams are not individuals using multiple devices. Teams are multiple people using one identity. The threat model is entirely different. An individual using NIP-46 is protecting their key from potentially compromised clients on their own devices. An organization using NIP-46 is protecting its key from its own employees, which is absurd, because the organization has already necessarily trusted those employees with access to the identity's reputation and reach.
The honest architecture for team use is custodial. The organization runs a server. The nsec lives on that server, properly secured with standard operational security practices. Employees get accounts on that server with granular permissions: Alice can post kind:1 notes, Bob can post kind:30023 long-form articles, Carol can only react to existing posts. When Alice clicks "post," the server signs the event locally and publishes it to relays. No round-trip. No relay dependency for signing. No latency beyond normal network propagation.
When an employee leaves, the administrator revokes their account. That revocation takes effect immediately because it is a database operation on infrastructure the organization controls, not a token invalidation that must propagate through Nostr's eventually-consistent relay network.
The objection writes itself: this is custodial, and custodial is bad. Not your keys, not your posts. This objection reveals the conceptual error at the heart of current team solutions. The nsec in question does not belong to the employees. It belongs to the organization. The employees never had sovereignty over it. They were always operating under delegation from an authority that could revoke their access.
This is not a novel or alarming arrangement. It is how every organization has operated since the invention of organizations. When a social media manager posts to a company's X account, they do not hold the account's credentials in a personal hardware wallet. They log into a system that grants them permissioned access to post on behalf of the company. When they leave, their access gets revoked and the company's account continues unchanged.
The entire corporate social media industry operates this way. Hootsuite, Sprout Social, Buffer, and dozens of other tools provide team management for social accounts, and none of them pretend to offer employees sovereign custody of the accounts they manage. This would be nonsensical. The account belongs to the organization, the organization delegates operational access to employees, and the organization can revoke that access.
Nostr's architecture actually makes this pattern cleaner than traditional social media. On X, if a departing employee disputes their termination, there is always the awkward possibility that they retained credentials somehow, or that revocation failed, or that the platform's access control has bugs. On a self-hosted Nostr team server, the organization controls the infrastructure entirely. If an employee is terminated, their database record gets flagged and no subsequent requests from their session tokens will result in signed events. The nsec never left the server. There is nothing to leak, nothing to revoke at the relay level, nothing that depends on third-party systems functioning correctly.
The speed advantage compounds with scale. Consider a news organization that wants to publish breaking news to Nostr. With current NIP-46 solutions, every publish involves relay round-trips for signing, then additional relay connections for actual publication. Under load, with multiple reporters filing simultaneously, the signing relays become bottlenecks. With a custodial team server, signing is a local cryptographic operation taking microseconds, and the only network latency is publication to content relays, which would be required regardless.
Permission granularity improves as well. NIP-46 was designed for personal use and treats permissions as a binary: either you can sign events of a particular kind, or you cannot. A purpose-built team system can implement nuanced controls: posting only during business hours, mandatory review for posts mentioning certain topics, rate limits per employee, audit logs tracking who posted what and when. These features would be baroque to implement over NIP-46's remote signing protocol but are straightforward in a server application with a proper permission system.
The architectural honesty here matters beyond mere efficiency. Current solutions create a false impression of employee sovereignty while actually requiring trust at multiple points: trust that the NIP-46 signer is correctly configured, trust that relay connections are stable, trust that tokens are properly scoped. A custodial system makes the trust model explicit. Employees trust the organization, the organization controls the server, and the server holds the key. No pretense, no unnecessary indirection, no failure modes that exist only to maintain a fiction.
None of this applies to individual users. If you are a person managing your personal Nostr identity, you should absolutely use a signer like Amber or nsec.app. Your threat model is real: clients you install might be compromised, services you log into might be malicious, and your key represents your personal reputation and relationships. Self-custody solves your actual problem.
But if you are an organization, your "key" represents a legal entity that already operates through delegation and revocable access grants. Your employees do not have sovereign claims to your corporate identity, and pretending otherwise in your technical architecture creates complexity without benefit.
The path forward is straightforward. Someone builds a Nostr team client designed from the ground up for organizational use. It runs on a server the organization controls. It stores the nsec encrypted at rest with proper key management. It provides a web interface where administrators create employee accounts with granular permissions. It signs events locally and publishes them directly to relays. It logs everything for audit purposes. It handles employee offboarding with a single database flag.
This is not technically difficult. The hard part is cultural: convincing a community steeped in self-custody ideology that custodial architecture is appropriate for some use cases. The ideology emerged from Bitcoin, where the stakes were financial and the custodians were often untrustworthy third parties. Nostr inherited the ideology without examining whether it applied to organizational contexts where the custodian is the organization itself.
The custody question exists on a spectrum defined by who you are protecting the key from. Individuals need protection from compromised clients. Organizations need protection from departed employees. These are different problems with different solutions.
Current Nostr team tools are like using a hardware wallet to manage petty cash. A custodial team server is the obvious tool for the job, and building one would do more for organizational Nostr adoption than any further refinement of remote signing protocols.