Me either, nor an authority, but I found this old reddit thread that says what I'm thinking but better. Obviously PBKDF one-way hash functions are all over the place so it's been done for a while, but some users explain the flaws with some asymmetric algs and deterministic keys with predictable inputs (human inputs) I can't speak to secp256k1 we use on nostr.
https://www.reddit.com/r/crypto/comments/5yv8i9/is_it_possible_to_use_a_key_derivation_function/
Personally my thoughts are, for now, I believe we have far safer ways of generating asymmetric key pairs with computers than derived from knowledge. And I think we can make it just as convenient.
My approach with my NVault project: generate keys on a remote server, that requires physical access to extract keys outside of the application. The server signs client events on demand over the network. Extensions sign in with conventional means or PKI (I use hardware authentication). I already support custom RNG libraries, and intend to support off-server signing through hardware devices soon. (Id like to see a more standardized hardware signing protocol). I suppose its essentially a custodial model but self hosted.