• DeGandalf@kbin.social
    link
    fedilink
    arrow-up
    10
    ·
    edit-2
    1 year ago

    This basically just means the files themselves become the authentication.

    I don’t see a singe use-case, where you couldn’t just use normal private-key encryption and just save the private key to a file somewhere else. And if you want to distribute it to multiple locations, so that you need all of them, then there are also encryption methods for that.