You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
By leveraging Tor's key derivation scheme, we can allow anyone who knows root public key to derive children public keys without knowledge of any secret keys.
This enables purpose-separated keys, which eliminates any chance of cross-application signature reuse attacks.
The text was updated successfully, but these errors were encountered:
By leveraging Tor's key derivation scheme, we can allow anyone who knows root public key to derive children public keys without knowledge of any secret keys.
This enables purpose-separated keys, which eliminates any chance of cross-application signature reuse attacks.
The text was updated successfully, but these errors were encountered: