This sequence:
Alice and Bob use nostr clients.
Charlie runs a relay.
Both Alice and Bob set their clients to use Charlie's relay for inbox and outbox.
Both Alice and Bob configure their clients to use CRI.
Alice follows Bob.
Bob opens his client software on Day 0 and posts notes successfully. He keeps his client software running constantly.
Alice opens her client software on Day 0 and successfully reads all of Bob's notes from Day 0 (from Charlie's relay).
Alice closes her client software on Day 1, it is no longer running on her computer or phone.
Bob posts a note on Day 2, it is stored at Charlie's relay.
Bob's key rotation occurs on Day 3. Bob publishes the old secret key on Day 3.
Bob posts a note on Day 4 using the new key, it is stored at Charlie's relay.
Eve uses Bob's old secret key on Day 4 to post a note dishonestly back-dated to Day 2 and publishes it to Charlie's relay.
Alice opens her client software on Day 5 and it retrieves the Day 2 posts, Day 3 rotation event, and Day 4 post from Charlie's relay.
How can Alice's client know which post on Day 2 is legitimate? Would both be flagged as "post rotation noise" or both appear legitimate or some other outcome?