I like the idea that a compromised key becomes a time limited event. Would deriving child keys be comparable to HD keys or BIP85?

Reply to this note

Please Login to reply.

Discussion

No replies yet.