Closed azul closed 6 years ago
finished my review -- added a few comments. i suggest to more cross-reference keyhistory and the verified-key-attack scenarios. By pointing to keyhistory, it's more obvious why going about keychanges opportunistically still maintains an overall high level of security against active attacks.
@hpk42 I left two conversations unresolved because I would like your feedback on my solutions there.
Addresses #76