What methods should we implement to detect malicious content?

How does a developer revoke an Ed25519 key or authenticate a new key to PyPI?
What prevents an account from being compromised and having a new developer key uploaded to sign a malicious update?

I’m also still not sure I understand who signs the root.layout.