Can't this still be exploited by the attacker invalidating your current pubkey and replacing it with one he / she controls? It seems like key invalidation needs to happen outside the system somehow.
Can't this still be exploited by the attacker invalidating your current pubkey and replacing it with one he / she controls? It seems like key invalidation needs to happen outside the system somehow.
No replies yet.