Comment by cyberax
11 hours ago
Sure. They can use my key while my machine is compromised, but even then I won't _need_ to rotate it after the compromise is cleared.
It still would be a good idea just to make sure that it's easier to analyze logs, but it's not strictly needed.
No comments yet
Contribute on Hacker News ↗