Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

As an alternate design, could I escrow decryption keys with one or more trusted third party services, and rely on that service to destroy those keys over time?

0
Posted

As an alternate design, could I escrow decryption keys with one or more trusted third party services, and rely on that service to destroy those keys over time?

0

Yes, you could do this. The question is whether you would like to trust such third party storage services. The situation with Hushmail—an email encryption company that was giving cleartext copies of encrypted messages to the government—is an example of such a trusted service that apparently violated users’ expectation of privacy. Given the situation with Hushmail, users would likely not trust such managed escrow services. Vanish avoids these concerns via its method for leveraging global scale, decentralized, peer-to-peer networks. Specifically, our Vanish prototype leverages portions of the popular Vuze Bittorrent network. See below for details.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123