Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> If you have an method for requiring n out of m key parts to use the key, it is fairly easy to see how this can be used to require n out of m characters from a password.

It doesn't sound very easy to me at all. Can you explain in more detail?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: