Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Depends if the network has memory. If you can publish a "this key is compromised" message then at least you can take down your own identity so the thief can't use it, and work on re-establishing a new one.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: