2/

To handle public-key cryptography safely, often a user should be able to have multiple public-keys.

For example, a user might have a different public-key on each device, rather than sharing public-keys.

A user might delegate to a 3rd party — and there may be a delegated versus non-delegated public-key distinction.

Key-rotation is also often necessary for safety reasons.

Etc.

...

0

If you have a fediverse account, you can quote this note from your own instance. Search https://mastodon.social/users/reiver/statuses/115945215805826182 on your instance and quote it. (Note that quoting is not supported in Mastodon.)