this post was submitted on 11 Feb 2025
77 points (98.7% liked)
GenZedong
4396 readers
163 users here now
This is a Dengist community in favor of Bashar al-Assad with no information that can lead to the arrest of Hillary Clinton, our fellow liberal and queen. This community is not ironic. We are Marxists-Leninists.
This community is for posts about Marxism and geopolitics (including shitposts to some extent). Serious posts can be posted here or in /c/GenZhou. Reactionary or ultra-leftist cringe posts belong in /c/shitreactionariessay or /c/shitultrassay respectively.
We have a Matrix homeserver and a Matrix space. See this thread for more information. If you believe the server may be down, check the status on status.elara.ws.
Rules:
- No bigotry, anti-communism, pro-imperialism or ultra-leftism (anti-AES)
- We support indigenous liberation as the primary contradiction in settler colonies like the US, Canada, Australia, New Zealand and Israel
- If you post an archived link (excluding archive.org), include the URL of the original article as well
- Unless it's an obvious shitpost, include relevant sources
- For articles behind paywalls, try to include the text in the post
- Mark all posts containing NSFW images as NSFW (including things like Nazi imagery)
founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Can you explain more about how this relates to alleviating the problem? I'm curious and admittedly, when I read "crypto", I think of big tech grifters, but I know that's not all of cryptography as a field.
Cryptocurrency has forever ruined "crypto" :(
But in any case, m-of-n cryptography (Shamir Secret Sharing) permits "m" keys out of a total "n" keys to unlock a secret, such as the login credentials for a domain registrar. So long as "m" keys are available, the login credentials can be recovered. This avoids having a single point of failure, for example, where only one person knows the login credentials and is AWOL. So long as "m" other folks are still around and active, they can recover the login credentials without the AWOL person.
Oh interesting, that makes sense. Thanks for the explanation!