← Back to HQ

The Sovereign Protocol – Architecture of an Unconfiscatable Digital Identity

by Alien Investor

We live in an era of digital feudalism. On platforms like X (formerly Twitter), Instagram or LinkedIn, you are merely a tenant. Your account, your reach, and your reputation are a "rental agreement" that can be terminated at any moment with a simple database command.

A true owner accepts no uncovered liabilities. That's why we move from platforms (centralized) to protocols (decentralized).

In Nostr, your identity is not an entry on a Silicon Valley corporation's server, but a mathematical proof. Your private key (nsec) is the equivalent of a gold bar in the vault. Whoever holds the key, is the identity.

This guide describes the pragmatic path that is the only sensible one for most security-minded users: Key is generated in the signer and stays there. The client only gets the npub — and signatures.

Rule #1: Never type your nsec into Primal, Amethyst, or any browser login. The nsec belongs in the signer. Full stop.

Part I: The Preparation (The Clean Room)

Do not create your identity in an environment you don't trust. If you're running GrapheneOS: perfect. If not: lock it down as much as possible.

The Tools

The mindset: We assume every online environment is hostile. Clipboard sniffers and malware are just waiting to grab a string that starts with nsec1....

Part II: The Genesis (Key Generation Directly in Amber)

We don't let some random website generate the key. We generate it where it belongs: in the signer.

  1. Enable airplane mode. Optional: also disable Wi-Fi/Bluetooth.
  2. Open Amber and select "Create new account" / "Create new".
  3. Amber generates a new keypair (private key + public key).
  4. Secure Amber immediately: PIN/biometrics, system lock active.
Important: The private key stays in Amber. You treat Amber like a hardware wallet for Nostr. No experiments, no "Always sign without prompting" convenience for no good reason.
No third-party generation: Never let anyone generate or send you an nsec. Whoever sees the nsec can theoretically take over your identity. Generate the key directly in Amber and use exclusively "External Signer" in the client from that point on.

GrapheneOS Extra: Disable Network Permission for Amber

If you're running GrapheneOS, you can harden Amber further: revoke the Network permission from Amber. This cuts off Amber's network access — keeping it a pure signer.

Part III: The Interface (Primal)

Now we install the client — the window to the world. We use Primal for its speed and user experience (Amethyst is a valid alternative).

The Critical Moment

On first launch, Primal asks for a login. Millions of users type their nsec here. You don't.

What just happened? Primal only received your public key (npub). Primal does not know the secret.

When you post:

  1. Primal composes the text.
  2. Primal sends the signing request to Amber.
  3. You confirm in Amber.
  4. Amber signs and returns only the signature.
  5. Primal broadcasts the signed post to the network.
Reality check: This protects you from "client steals nsec". It does not protect you if your smartphone is fully compromised or you grant Amber permissions too generously. Sovereignty means: minimal permissions, maximum skepticism.

Part IV: The Backup (Steel, Not Paper)

Digital data corrupts. Paper burns. A true Alien Investor secures for eternity.

Rule #2: No cloud backup, no screenshots, no messenger, no notes app, no copy & paste marathon. Back it up cleanly once. Then the nsec stays in Amber.

Alien Verdict: Welcome to Sovereignty

You have just created a digital identity that:

That is the difference between "having an account" and "owning an identity". You are no longer a user. You are a sovereign node in the network.

"Trust no one. Verify everything."

Further reading: GrapheneOS – why the foundation matters

If you want a solid understanding of GrapheneOS's key features (hardening, permission management, sandboxing, network control), read my article:
GrapheneOS – Secure Android

Tools for true owners (advertising/affiliate)

If you're serious about sovereignty, use hardware and services that respect you:

Note: Some of these links are affiliate links. If you use them, you support my work at no extra cost to you. Thanks!

Sources & Resources

Official resources for the components used:


Recharge (Donate)

Send fuel to the mothership

Thanks for your support — for free content, financial sovereignty, and the extraterrestrial resistance!