This… is not the dumbest idea in the world.https://krypt.co/
-
-
Replying to @tqbf
permitting the phone to use the key for implementation reasons seems suboptimal
1 reply 0 retweets 0 likes -
isn't exactly this the usecase treshold signature algorithms are designed for? split secret and compatibility with existing pubkey schemes?
1 reply 1 retweet 1 like -
the blob signed during SSH client auth at least contains the user name: https://tools.ietf.org/html/rfc4252#section-7 …
1 reply 0 retweets 1 like
for the hostname, you might have to trust the phone though
3:00 PM - 1 May 2017
0 replies
0 retweets
0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.