Interesting… how do you envision it actually working with the protocol? Who holds the keys for the non nostr user?