With the disclaimer that I haven't dug into it seriously enough, I understand it's a public key (that I can also rotate) that I can use to prove that an account somewhere else is really mine. Note that I have no idea what the private key is, or how to dig it out - I'm sure that's documented somewhere, but I wasn't interested enough for now.
TL;DR: there definitely is a theoretical mechanism for users to "take their toys with them." How it works out in practice is a different matter. I suspect most users wouldn't know they're supposed to keep a bundle of data stored somewhere for a dark hour. I also wonder how the protocol protects itself from people accidentally putting that data in public.
There's a thing called DID that identifies you. There's a few options, but one is called "DID PLC" with a sample implementation here:
https://github.com/did-method-plc/did-method-plc
With the disclaimer that I haven't dug into it seriously enough, I understand it's a public key (that I can also rotate) that I can use to prove that an account somewhere else is really mine. Note that I have no idea what the private key is, or how to dig it out - I'm sure that's documented somewhere, but I wasn't interested enough for now.
TL;DR: there definitely is a theoretical mechanism for users to "take their toys with them." How it works out in practice is a different matter. I suspect most users wouldn't know they're supposed to keep a bundle of data stored somewhere for a dark hour. I also wonder how the protocol protects itself from people accidentally putting that data in public.