you could do this, but someone would need to write a tool to do it.
Would be huge to have in case of compromised keys
Please Login to reply.
No replies yet.