Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Shared key.

You have a key, which encrypts a shared key.

Your spouse has a key, which encrypts the same shared key.

Vault is encrypted with the shared key.

Access is controlled separately. But upon successful share, their existing key can decrypt the shared key which decrypts the vault.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: