Correct. The use of the main key as receiver makes it country party trustless. If the receive uses a separate key to receive, he just needs to leak that key to expose the sender.

Reply to this note

Please Login to reply.

Discussion

* Counter party.

I see, that's a fascinating incentive design.