How would NIP-26 delegation work into this issue? If a nip-26 delegated key were to be compromised, could events be somehow attached to a new key, delegated by the same root private key?
How would NIP-26 delegation work into this issue? If a nip-26 delegated key were to be compromised, could events be somehow attached to a new key, delegated by the same root private key?
No replies yet.