The request would need to be signed by the leaked key, similar to an SSL certificate revocation list. That affrms that either 1) the owner requested the revocation, or 2) the key was leaked and someone else requested the revocation.

The same mechanism could be used for de facto account deletion, if all relays honored it.

Reply to this note

Please Login to reply.

Discussion

No replies yet.