This… is not the dumbest idea in the world.https://krypt.co/
-
-
isn't exactly this the usecase treshold signature algorithms are designed for? split secret and compatibility with existing pubkey schemes?
-
the blob signed during SSH client auth at least contains the user name: https://tools.ietf.org/html/rfc4252#section-7 …
- 1 more reply
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.