Storage threat model tutorial #90
Replies: 2 comments 2 replies
-
Incomplete Things this would need to do:
Now the software can optimize the threshold, share quantity, how many copies for each share and who gets which share(s) or secret to minimize the risk of all cause loss to you and/or your heirs given the available locations, their theft and loss risk attributes as well as correlated theft and loss risks. To make rating 1 to 3 more meaningful they might be defined as a percentage 1 = 5% per year, 2 = 10% per year, 3 = 20% per year that way the software actually finds a mathematically optimal solution. Finally, it would print recovery instructions for your heirs with the name of the holder and share header of the share you need to write in and a grid for the CompactQR. These instructions have instructions on the conditions they'll release the data to you (healthy, well, and free or only in person etc.) https://medium.com/@HodlSafe/instructions-for-signatories-dc7243f0acca What's good about a computer tutorial for this is it can do an exhaustive search over every combination, including giving the same share to multiple people and giving one or more persons multiple unique shares or even the secret itself. As the number of locations/people grows beyond 5-10 there is a combinatoric explosion of possibilities that makes it unlikely a human doing this by hand would find the optimum allocations for their shares. |
Beta Was this translation helpful? Give feedback.
-
Since this is based on social key recovery, I'll leave this link here and try to finish Christopher Allen's book if I get stuck implementing this optimization problem and need heuristics to reduce the search complexity. |
Beta Was this translation helpful? Give feedback.
-
From telegram, posted her for easier access later:
Ben Westgate, [9/22/23 7:45 AM]
I'm thinking after Beta I'll try to have a graphical utility that walks users thru a threat model of their storage locations and persons. Picks the correct threshold, share quantity and how many copies of each share to distribute and to whom after asking simple questions.
Ben Westgate, [9/22/23 7:46 AM]
It's arguably the most important part after creating a backup and it's strange that nobody has made a tutorial for it. As it is something a computer can optimize for a user.
@extrapockets extrapockets, [9/22/23 7:58 AM]
This is a great idea.
@epiccurious Epic Curious, [9/22/23 8:35 AM]
Agreed, it would be a nice touch.
Beta Was this translation helpful? Give feedback.
All reactions