In either case the nsec can be assumed to be compromised, so the desired result is achieved.

Reply to this note

Please Login to reply.

Discussion

That's a good point.