this post was submitted on 15 Dec 2025
27 points (100.0% liked)

Privacy

3529 readers
320 users here now

Icon base by Lorc under CC BY 3.0 with modifications to add a gradient

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Auster@thebrainbin.org 2 points 1 month ago

If I'm getting this correct, would it be something similar to AT Protocol's relay servers, except just for keys? If so, it could have some interesting (positive) repercussions to a chain of trust, as then mismatches could more easily indicate suspicious servers.