The first sentence seems to be repeated after the second.
Edit now that I’ve read the post:
A full, unsplit key would presumably have to exist at some point if you’re trying for full backward compatibility with the existing network protocol. There would be some logistical issues with ensuring that you didn’t leave traces on the computer that performed this operation, or in the process of transferring the split halves from that computer to the other shareholder. A moderately experienced cryptographer should be able to anticipate and deal with this kind of thing, but it’s worth pointing out to any prospective hobbyist hackers.
The override key can probably just be the unsplit key in a bank deposit box.
The first sentence seems to be repeated after the second.The first sentence seems to be repeated after the second.
Fixed, thanks.
The override key can probably just be the unsplit key in a bank deposit box.The override key can probably just be the unsplit key in a bank deposit box.
If you do it that way, you can’t make new receiving addresses, because those are private keys. You can keep the same receiving address for all your transactions, but if you do then it isn’t as anonymous anymore. In any case, the override key is the easy part of this scheme, and anything that ensures you have a proper backup will do.
The first sentence seems to be repeated after the second.
Edit now that I’ve read the post:
A full, unsplit key would presumably have to exist at some point if you’re trying for full backward compatibility with the existing network protocol. There would be some logistical issues with ensuring that you didn’t leave traces on the computer that performed this operation, or in the process of transferring the split halves from that computer to the other shareholder. A moderately experienced cryptographer should be able to anticipate and deal with this kind of thing, but it’s worth pointing out to any prospective hobbyist hackers.
The override key can probably just be the unsplit key in a bank deposit box.
Fixed, thanks.
If you do it that way, you can’t make new receiving addresses, because those are private keys. You can keep the same receiving address for all your transactions, but if you do then it isn’t as anonymous anymore. In any case, the override key is the easy part of this scheme, and anything that ensures you have a proper backup will do.
You really need to get your paste key checked.