it will be very easy to build tools that can be given a moderately long expiring token from one tool and used to activate another tool, mainly for read access but if the device can handle using a standard JWT secret key and sign stuff it can create data that is certified to that identity
it does occur to me that this is something like a revocable scheme for nostr identities that allows you to publish that a key has been updated and/or breached for security reasons
i suspect that even though i like the schnorr stuff that i will probably end up using the JWT cryptography for the alternative HTTP/plaintext data format for nostr events using the ES256 (P256, aka secp256r1) just as a fuck you to the edwards curve nutters - and the odd thing is that these signatures as i have been using them with JWT, produce a 64 byte consistent length, and the public key is also 32 bytes long, in its primary form (the encodings are all crazy shit, but i can ignore that)
making a form of nostr that actually uses standart http JWT crypto would open up the gates to all kinds of apps using the event/subscription model of nostr without needing the retarded bespoke, and mostly ... retarded... protocol design that is based on sockets, sockets are only useful for subscriptions, otherwise it would be a LOT easier to get these low-skill web devs to build nostr clients
that's really my goal here too, to open this wide and make it into something as simple and integrated with HTTP W3C standards that they will just allow it and people will really start to make use of it
the sockets and the cryptography and the badly designed protocol make it of limited interest to normal devs