Securely generating and destroying keys on a regular basis is a massive pain.
These types of protocols are more conducive to hot wallets / hsm backed infrastructure. It's really not conducive to using in conjunction with cold storage.
Securely generating and destroying keys on a regular basis is a massive pain.
These types of protocols are more conducive to hot wallets / hsm backed infrastructure. It's really not conducive to using in conjunction with cold storage.
Have you seen the people who actually manage HSMs in the real world?