676e696f70
676e696f70.bsky.social
676e696f70
@676e696f70.bsky.social
Exploring a potential product using Shamir's Secret Sharing. Working to shape a brand before the product even has a name. Follow to watch it unfold. Building from the ground up—bumps included. This account is run by an introvert.
While promising, Shamir's Secret Sharing presents a labyrinth of obstacles that make it impracticable.
#cybersecurity #infosec #security
November 10, 2025 at 11:01 PM
So, I started working on it during my free time.
#cybersecurity #infosec #security
November 9, 2025 at 11:00 PM
While it couldn't solve her current issue, it was something others would find useful.
#cybersecurity #infosec #security
November 8, 2025 at 11:00 PM
She agreed, the type of service might have helped unlock her cousin's phone.
#cybersecurity #infosec #security
November 7, 2025 at 11:01 PM
So, I laid out the key elements for a password backup service to my co-worker.
#cybersecurity #infosec #security
November 6, 2025 at 11:01 PM
Something that might have helped.
#cybersecurity #infosec #security
November 5, 2025 at 11:00 PM
There was an idea that's been brewing in my mind for a number of years.
#cybersecurity #infosec #security
November 4, 2025 at 11:01 PM
Some could be expensive, others time-consuming, and there wasn’t always a guarantee of success.
#cybersecurity #infosec #security
November 3, 2025 at 11:00 PM
Each method came with its own set of challenges and uncertainties.
#cybersecurity #infosec #security
November 2, 2025 at 11:01 PM
Over drinks, we discussed the various approaches she could take to unlock it.
#cybersecurity #infosec #security
November 1, 2025 at 11:00 PM
Central to this mystery was her locked phone.
#cybersecurity #infosec #security
October 31, 2025 at 11:01 PM
My co-worker shared how her cousin had passed away unexpectedly, leaving the family devastated and bewildered, especially since there were no she was struggling.
#cybersecurity #infosec #security
October 30, 2025 at 11:02 PM
The method, while secure, hadn't been as user-friendly as we'd hoped and had largely been forgotten in the daily grind.
#cybersecurity #infosec #security
October 29, 2025 at 11:01 PM
The method, while secure, hadn't been as user-friendly as we'd hoped and had largely been forgotten in the daily grind.
#cybersecurity #infosec #security
October 28, 2025 at 11:02 PM
A few years had passed since our attempt to use Shamir's Secret Sharing to share passwords among management.
#cybersecurity #infosec #security
October 27, 2025 at 11:01 PM
Writing the primary access keys on a sheet of paper, handing it over, but not without making sure they were fully aware of the potential dangers.
#cybersecurity #infosec #security
October 26, 2025 at 11:01 PM
Seeing no other option, management was provide the information as requested.
#cybersecurity #infosec #security
October 25, 2025 at 11:01 PM
Finding the whole process of reconstructing the keys from shares cumbersome.
#cybersecurity #infosec #security
October 24, 2025 at 11:02 PM
They simply wanted the passwords in a plain text format.
#cybersecurity #infosec #security
October 23, 2025 at 11:01 PM
They argued that the cloak-and-dagger approach was unnecessary.
#cybersecurity #infosec #security
October 22, 2025 at 11:01 PM
The management team, despite our best efforts to explain the security benefits, scoffed at the elaborate method.
#cybersecurity #infosec #security
October 21, 2025 at 11:01 PM
However, the accomplishment was fleeting.
#cybersecurity #infosec #security
October 20, 2025 at 11:01 PM
The primary access keys were provided in safe and secure manner, leaving no room for misuse.
#cybersecurity #infosec #security
October 19, 2025 at 11:01 PM
The bigwigs interest in obtaining high-level system passwords was solved.
#cybersecurity #infosec #security
October 18, 2025 at 11:00 PM
It was like scattering the pieces of a puzzle across the room, impossible for any one person to assemble without the cooperation of others.
#cybersecurity #infosec #security
October 17, 2025 at 11:01 PM