← Back to HQ

Nostr & Security: Why You Must Never Paste Your Private Key Into an App (and Why You Need Amber)

by Alien Investor

On Nostr, you are not a row in some tech corporation's database. You are a cryptographic key. Your private key (nsec) is your voice, your identity, and your reputation. Whoever holds that key is you.

And yet most users — especially the comfortable ones — commit digital harakiri on a daily basis: they copy their nsec from a password manager and paste it directly into apps like Primal or Damus. It works. But from a security architecture standpoint, it's a nightmare.

Why that's the case, why your password manager hits its limits here, and why you urgently need to switch to a dedicated signer like Amber — that's what we're covering today.

Rule #1: Never type your nsec into Primal, Amethyst, or any browser login. The nsec belongs in the signer. Full stop.

1. The Problem: Your "Login" Is Actually a Surrender

When you sign into a Nostr app like Primal by pasting your key, things happen in the background that you need to understand.

The Clipboard Is a Public Marketplace

A password manager is built to securely store secrets. But to use them, it has to decrypt them and hand them off to the operating system — usually via the clipboard.

The "Hot Wallet" Trap

Once you paste the key into Primal (or any other client app), the app has to store it so you don't get prompted again on every like.

That means: a complex social media app with millions of lines of code, image parsers, and constant internet access holds your most important key in permanent reach. If a hacker finds a vulnerability in Primal (say, through a manipulated image), they could theoretically read out your key. You've just turned your client into a "hot wallet."

2. The Solution: Amber and the Signer Principle

Amber is a Nostr Event Signer for Android. The app does exactly one thing: it holds your key and signs things for you — but it never hands the key out.

The Difference: Secret vs. Signature

Technically this works via NIP-55 (Android Intents). No key data is transferred at all. Primal doesn't even know what your private key looks like; the app only knows your public key (npub).

"Amber is like a hardware wallet running as software on your phone. It isolates the secret from the app that broadcasts to the internet."

3. Why Amber Is More Secure Than Your Password Manager

Many people think: "An additional app just increases the attack surface, right?" — Wrong. In this case it's the exact opposite. It's called compartmentalization.

No Internet Access for the Key

You can (and should) revoke Amber's internet access entirely in Android settings. An app that can't "phone home" can't steal your key — even if it were compromised. Primal, on the other hand, must be online.

Android Keystore & Biometrics

Amber uses the Android Keystore System. Where possible, your key is processed inside a dedicated security chip (Titan M, StrongBox). You can also require a fingerprint for every signature. Even if someone steals your unlocked phone and opens Primal, they can't post anything — because Amber requires your fingerprint to sign.

4. The "Legacy" Question: My Key Was Created in Primal — Is It Burned?

This is the most common objection: "I created my account directly in Primal. The key was already online. Is migrating still worth it?"

The answer is a clear YES.

Origin Risk vs. Future Protection

Sure: if Primal was compromised in the past or got hacked, your key could theoretically be sitting on some server. That's the "origin risk." But:

5. Guide: How to Migrate Properly (The "Primal Nuke")

Simply "logging out" often isn't enough, since data remnants can remain in storage. Here is the clean path to sovereignty:

  1. Check your backup: Make sure you have your nsec securely noted (offline, on paper or metal). No backup means no access!
  2. Install Amber: Download Amber (preferably via F-Droid or GitHub — verify the source).
  3. Import your key: Enter your nsec into Amber. Immediately enable biometric lock (fingerprint).
  4. The "Nuke" for Primal: Don't just log out. Go to Android Settings → Apps → Primal → Storage → Clear Data. This forces Android to physically wipe the app's entire storage area.
  5. Restart via Signer: Open the "fresh" Primal. At login, do not choose "Enter nsec" — choose "Log in with external signer" (usually a key icon).
  6. Authorize: Amber opens and asks for permission. Confirm it. Done.

You are now using Primal purely as a front-end. Your key sits safely inside Amber's vault.

6. Alien Verdict: Take Back Your Sovereignty

Convenience is the enemy of security. Copy-pasting private keys is a bad habit inherited from the Web2 world — one we need to leave behind.

Migrating to a signer like Amber effectively turns your smartphone into a "Hardware Wallet Light." You trade a systemic risk (key in the clipboard and inside the app) for a hardened architecture. Even if it takes five minutes: do it. Your digital identity is worth it.

For the Paranoid: Key Rotation

If you want to be 100% certain your key was never compromised (because it once lived in Primal), there is only one option: Key Rotation.

  1. Generate a completely new nsec directly in Amber (or offline).
  2. Post a migration notice from your old account.
  3. From now on, use only the new account.

For most people, migrating to Amber with the old key is more than sufficient — but true sovereignty doesn't compromise.

Tools for Real Owners (Advertising/Affiliate)

Tools I use myself — for Bitcoin self-custody and digital sovereignty:

Disclosure: Some of these links are affiliate links. Using them supports my work at no extra cost to you. Thanks!

Sources (Selection)

This article is based on an internal security architecture analysis of Nostr signer implementations (as of December 2025), the official documentation for NIP-55 and NIP-46, and the security specs of the Android Keystore System. References to Primal and Amber refer to the versions current at that time.


Recharge Energy (Donations)

Send fuel to the mothership

Thanks for your support — for free content, financial sovereignty, and the extraterrestrial resistance!