You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/how-it-works/creating-your-identity.mdx
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,6 @@ This approach provides stronger security than traditional systems:
67
67
68
68
-**No Password Database**: There's no central database of passwords to be breached
69
69
-**No Identity Theft**: Your identity can't be stolen from a third party because no third party stores it
70
-
-**Forward Secrecy**: Even if a device is compromised, past communications remain secure
71
70
-**Cryptographic Proof**: Your identity is mathematical fact, not corporate assertion
72
71
73
72
The trade-off is responsibility: you must securely store your encrypted keys and remember your password. There's no customer support to call if you lose access - but there's also no company that can lock you out of your own identity.
0 commit comments