1Oca
Possible public/private identity recovery after compromise without a centeral authority?
I’ve been thinking about P2P systems using asymmetric keys and wondering if there is anyway to recover an identity in the event it was compromised using some kind of web-of-trust.
This seems to be a large issue compared to a regular syst…