2015-11-03 5:33 GMT+01:00 Manu Sporny <msporny@digitalbazaar.com>: > The current approach for the WebDHT is to loosely couple identifiers and > the keys that you can use to prove that those identifiers are yours. > > For example, the WebDHT enables you to specify a set of keys or other > identifiers that should have write access to the entry in the DHT. This > means that even in the event of a key loss, you can recover that > identifier by asking people (or services) that you trust to associate a > new device/keypair with the identifier. I'm sorry if this has been mentioned already, but what you describe sounds a lot like Keybase. How does WebDHT compare to it? https://keybase.io/ -- Asbjørn Ulsberg -=|=- asbjorn@ulsberg.no «He's a loathsome offensive brute, yet I can't look away»Received on Tuesday, 3 November 2015 09:48:10 UTC
This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 19:07:43 UTC