http://investst6kbbg2u3prbitqmt3ryxaghgksnpzsqj22y63tvwhnolgrad.onion/bitcoin-goldman/index11.html
Following rekeying, the old keys can be deleted, rendering previously used keys inaccessible to the end-user, and thus removing the user's ability to disclose the old key, even if they are willing to do so. Technologies enabling this sort of rapidly rekeyed encryption include public-key cryptography, hardware PRNGs, perfect forward secrecy, and opportunistic encryption.