Securely generating and destroying keys on a regular basis is a massive pain.

These types of protocols are more conducive to hot wallets / hsm backed infrastructure. It's really not conducive to using in conjunction with cold storage.

Reply to this note

Please Login to reply.

Discussion

Have you seen the people who actually manage HSMs in the real world?