logoalt Hacker News

TZubiriyesterday at 11:02 PM1 replyview on HN

The way I've been doing that is with Shamir Secret Sharing and encrypting keys until glass-breaking is necessary.


Replies

lokartoday at 12:20 AM

generating tons of keys? or just broad keys?

What I've done is generate a cert for the host(s) the user needs, for the time-span they need (subject to authorization logic).