Because it will need to be a note/key swap with a verified record to prevent the attacker backdating?
Login to reply
Replies (2)
correct
Fascinating project. Highly intrigued.