Follow

"Re: “implementations of DPKI and CONIKS must support decentralized key recovery to really address MITM attacks” next is diving into social key recovery. See two submitted advance readings (so far)."

via: twitter.com/ChristopherA/statu

Sign in to participate in the conversation
Mastodon

The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!