Aren't we still talking 80 bits of entropy, if an attacker found any one of the three parts?
I'm no expert, which is why I'm asking.
All the solutions I've seen have issues and trade-offs. This seems almost as good as multi-sig, and more importantly, something you can actually do without a huge amount of study and complexity.
Aren't we still talking 80 bits of entropy, if an attacker found any one of the three parts?
I'm no expert, which is why I'm asking.
All the solutions I've seen have issues and trade-offs. This seems almost as good as multi-sig, and more importantly, something you can actually do without a huge amount of study and complexity.