How would NIP-26 delegation work into this issue? If a nip-26 delegated key were to be compromised, could events be somehow attached to a new key, delegated by the same root private key?

Reply to this note

Please Login to reply.

Discussion

No replies yet.