[ExI] The second step towards immortality

Mirco Romanato painlord2k at libero.it
Sun Jan 5 14:04:00 UTC 2014

Il 02/01/2014 20:07, Martin Sustrik ha scritto:

>> They have root access to the hardware your program is running on.
>> Your private keys are on said hardware, else you wouldn't be able
>> to use them. (If you put them somewhere else, then whoever's
>> hosting that somewhere else.)  Therefore they have your private
>> keys.

> You are underestimating what crpytography can achieve. Check this:

Just to stay on simpler ground, what would prevent a software evolved
enough to have multiple instances running in different servers, in
different places?
And have every instance with a share of a Shamir Shared Secret.
Then an attacker would need to compromise M of N instances in
geographically different servers.
If an instance is compromised (as judged by the others) the other
instances rent a new server somewhere and seed a new instance with a new
set of SSS.

And why should they sit in some server forever when the instances could
change servers periodically?

Just to add to the difficulty of the attack.


More information about the extropy-chat mailing list