| ▲ | securesaml 5 hours ago | ||||||||||||||||
it is less of a problem for revoking attacker's keys (but maybe it has access to victim's contents?). agreed it shouldn't be used to revoke non-malicious/your own keys | |||||||||||||||||
| ▲ | nebezb 3 hours ago | parent [-] | ||||||||||||||||
The poster you originally replied to is suggesting this for revoking the attackers keys. Not for revocation of their own keys… | |||||||||||||||||
| |||||||||||||||||