- cross-posted to:
- technology@lemmy.world
- crypto@infosec.pub
- cross-posted to:
- technology@lemmy.world
- crypto@infosec.pub
You must log in or # to comment.
If I’m getting this correct, would it be something similar to AT Protocol’s relay servers, except just for keys? If so, it could have some interesting (positive) repercussions to a chain of trust, as then mismatches could more easily indicate suspicious servers.
I wonder why they didn’t build on top of matrix…




