- cross-posted to:
- [email protected]
- [email protected]
- cross-posted to:
- [email protected]
- [email protected]
You must log in or register to comment.
If I’m getting this correct, would it be something similar to AT Protocol’s relay servers, except just for keys? If so, it could have some interesting (positive) repercussions to a chain of trust, as then mismatches could more easily indicate suspicious servers.
I wonder why they didn’t build on top of matrix…



