logoalt Hacker News

jychangyesterday at 11:01 PM1 replyview on HN

You're revoking the attacker's key (that they're using to upload the docs to their own account), this is probably the best option available.

Obviously you have better methods to revoke your own keys.


Replies

securesamltoday at 12:06 AM

it is less of a problem for revoking attacker's keys (but maybe it has access to victim's contents?).

agreed it shouldn't be used to revoke non-malicious/your own keys

show 1 reply