Thanks Jameson! Beem thinking the same. What's clicked for me in your article is the info asymmetry. They probably studied you thoroughly. Also interesting with the legal issues of escalation. Regarding geographically distributed keys, it's hard to convince the attacker that that's the case. But that's out of scope for your article.