Or an individual identity request encrypted to one of your public keys. Once you authorize, the system builds a unique list of keys to be sent to the requester in such a way that if the requester leaks the list, you know which requester leaked.
Or an individual identity request encrypted to one of your public keys. Once you authorize, the system builds a unique list of keys to be sent to the requester in such a way that if the requester leaks the list, you know which requester leaked.
No replies yet.