Can't this still be exploited by the attacker invalidating your current pubkey and replacing it with one he / she controls? It seems like key invalidation needs to happen outside the system somehow.

Reply to this note

Please Login to reply.

Discussion

No replies yet.