http://investr4zcyv3issfcryd7mqiflbedhtbt6h4mnbd6b2qshg7sevffad.onion/okpay-bitcoin/index.html
Following rekeying, the old keys can be deleted, rendering previously used keys inaccessible to the end-user, and thus removing the user's ability to disclose the old key, even if they are willing to do so. Technologies enabling this sort of rapidly rekeyed encryption include public-key cryptography, hardware PRNGs, perfect forward secrecy, and opportunistic encryption.