Hi,
I would suggest Secret Key Splitting (e.g. Shamir's scheme), with an n-out-of-m
scheme. Add decryption instructions, give everyone you trust and who is not
easily discoverable a share of the key, the complete encrypted backups, and
tell them to follow instructions when they believe you are
Hi,
I would suggest Secret Key Splitting (e.g. Shamir's scheme), with an n-out-of-m
scheme. Add decryption instructions, give everyone you trust and who is not
easily discoverable a share of the key, the complete encrypted backups, and
tell them to follow instructions when they believe you are