• DeGandalf@kbin.social
    link
    fedilink
    arrow-up
    7
    arrow-down
    1
    ·
    edit-2
    1 year ago

    This basically just means the files themselves become the authentication.

    I don’t see a singe use-case, where you couldn’t just use normal private-key encryption and just save the private key to a file somewhere else. And if you want to distribute it to multiple locations, so that you need all of them, then there are also encryption methods for that.

    • Whooping_Seal
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      While there is no use case I do think it is quite an interesting project, although my opinion maybe clouded by the cool name given the encryption methodology.