You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Right now section 6 puts too much focus on shamir's secret sharing. Our understanding of how identities are managed and recovered has since evolved and we need to be clear about the best way(s) of managing the lifecycle and representation of an identity, e.g. via an identity contract, where identity recovery/replacement is simply done via n-of-m signatures from identities that user trusts. No secret sharing needed/wanted.
The text was updated successfully, but these errors were encountered:
Right now section 6 puts too much focus on shamir's secret sharing. Our understanding of how identities are managed and recovered has since evolved and we need to be clear about the best way(s) of managing the lifecycle and representation of an identity, e.g. via an identity contract, where identity recovery/replacement is simply done via n-of-m signatures from identities that user trusts. No secret sharing needed/wanted.
The text was updated successfully, but these errors were encountered: