@0x0 With the door to conversations open, I’ve been re-reading your proposal with a finer focus.
Key revocations can be tricky beasts. *Especially* when you take into account the likelihood of network partitions. What happens when my root-signed “revoke this leaf” message doesn’t immediately reach the server where an attacker is ready to impersonate me?
Of course, I take the position that A Blockchain Might Help Here. At a minimum, it ensures a monotonic, chronological record