Or an individual identity request encrypted to one of your public keys. Once you authorize, the system builds a unique list of keys to be sent to the requester in such a way that if the requester leaks the list, you know which requester leaked.

Reply to this note

Please Login to reply.

Discussion

No replies yet.