Traditional encryption solutions for data-at-rest rely on passwords, centralized key storage or linkage to identity and access management systems.
All of these methods come with usability and security drawbacks.
A more secure and user-friendly approach is to leverage threshold cryptography to split keys across multiple devices.
So what is threshold cryptography and how can we make use of it?
Brought to you by: