In either case the nsec can be assumed to be compromised, so the desired result is achieved.
That's a good point.
Please Login to reply.
No replies yet.