Why would you not be able to trust the other keys, particularly if they are keys that you know / follow / interact with?
Login to reply
Replies (2)
Exactly. If we presume Alice’s nsec is the only one compromised, and if she discovers the problem quickly and if she tells her close associates of the problem, and if a handful of them get the word out quickly using their uncompromised nsecs, then we have a relatively effective solution that can be implemented rapidly. Over time the new nsec would rebuild the old connections, but there’s no need for that to happen overnight.
Because if a big client gets compromised there will be many compromised nsecs.