• DeGandalf@kbin.social
    link
    fedilink
    arrow-up
    8
    ·
    edit-2
    2 years ago

    This basically just means the files themselves become the authentication.

    I don’t see a singe use-case, where you couldn’t just use normal private-key encryption and just save the private key to a file somewhere else. And if you want to distribute it to multiple locations, so that you need all of them, then there are also encryption methods for that.