• DeGandalf
    link
    fedilink
    6
    edit-2
    1 year ago

    This basically just means the files themselves become the authentication.

    I don’t see a singe use-case, where you couldn’t just use normal private-key encryption and just save the private key to a file somewhere else. And if you want to distribute it to multiple locations, so that you need all of them, then there are also encryption methods for that.

    • @Whooping_Seal
      link
      21 year ago

      While there is no use case I do think it is quite an interesting project, although my opinion maybe clouded by the cool name given the encryption methodology.