Skip to content

Some Considerations

Dazza Greenwood edited this page Feb 3, 2017 · 5 revisions

Levels of Security:

By handing off the hosting of the containerized keys to third party entities, we relinquish some level of control to the keys in exchange for liability. In theory people should be able to host the containerized keys themselves which means that they are directly responsible for them. It allows end users to decide if they want more personal responsibility over their keys. This extends the usability for the general public because people who are not as concerned over the idea of physically storing their online identity can still do so, while allowing for people who do to still interact with any system that utilize the containerized keys.

Related Links

Clone this wiki locally