Yes, I see the use cases. However, contingent staking should not be implemented as a layer 1 solution. We should first think hard and long about improving first implementations on layer 2 solutions (see dcspark's first quick implementation) for contingent staking. The base layer meant to secure the network should remain permissionless.