Hacker News new | past | comments | ask | show | jobs | submit | reppard's comments login

screenshots where? i didn't know you could post images on hn


On the linked article?


A project is born.


bump again


bump. how do you actually get someone to look at something on here?


Also has a 0 lvl DCC character generator


I believe the master key sharding he mentions based on this https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing and has actually been implemented(though I'm not sure if it is at the scale he implies) here https://www.vaultproject.io/docs/concepts/seal.html


Shamir's secret-sharing is one of my favourite algorithms, and it would be certainly be useful in an escrow system. But it actually doesn't address the problem brought up by the author, which is the insecurity of having the whole key present in a single location at the moment of encryption. I think it's a fairly minor issue, since the vast majority of users would never have warrants issued for their data and their keys would never be reconstructed (assuming that a critical number of the escrow agencies follows the law).

Far more troubling is the idea that I could be arrested or fined or whatever just for using strong encryption... although I don't think there is an appetite for such unenforceable laws in my country.

EDIT: (from article)

> Threshold crypto refers to a set of techniques for storing secret keys across multiple locations so that decryption can be done in place without recombining the key shares.

Does Shamir's algorithm meet this requirement? My understanding was that the fragments must still be brought together in one place and the key reconstructed, although if there is a way to implement the algorithm without doing this I'd love to know about it.


> the vast majority of users would never have warrants issued for their data and their keys would never be reconstructed (assuming that a critical number of the escrow agencies follows the law).

That would require a unique backdoor key for every device. Somehow these keys would need to be generated, split into parts, and those parts securely distributed to the independent escrow agencies.

There's no safe way to do that.


Shamir's requires full recreation of the original secret.

Treshold ECC signatures doesn't.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: