http://invest2cp6rhbv7dkpjxbytgmsv6jvr3dys2scvywhxkegc6t3oycfyd.onion/okpay-bitcoin/index.html
Following rekeying, the old keys can be deleted, rendering previously used keys inaccessible to the end-user, and thus removing the user's ability to disclose the old key, even if they are willing to do so. Technologies enabling this sort of rapidly rekeyed encryption include public-key cryptography, hardware PRNGs, perfect forward secrecy, and opportunistic encryption.