Ya, you def need to Vet some protocols.
Login to reply
Replies (1)
Even if I do, they can change and go rogue whenever they decide to do so.
Currently, we don’t have any forward secrecy at all.
I would like to see more fine-grained access control, e.g. with subkeys, in the future.