That's a great NIP solution. The main issue I see is in cases where the root key is already compromised. It also requires a fully secure handling of the root key. If we implement NIP-26 and then create new root keys from scratch, we could safely move from our old Nostr identities to new ones.