|
|
|
@ -91,8 +91,8 @@ potential leaks or theft.
|
|
|
|
|
## Approach
|
|
|
|
|
|
|
|
|
|
Synchronizing private keys among devices of the same user in a secure
|
|
|
|
|
manner.
|
|
|
|
|
|
|
|
|
|
manner by using Trustwords (cf. {{I-D.birk-pep-trustwords}}) between any
|
|
|
|
|
two devices to pair them before starting the exchange of the private keys.
|
|
|
|
|
|
|
|
|
|
## Main Challenge
|
|
|
|
|
|
|
|
|
|