The person could encrypt a text file that contains the address with the Shamir secret sharing scheme and then send the encrypted pieces to different emails, which you can later reconstruct by combining the pieces. But this is challenging if the person is not technically inclined.

Reply to this note

Please Login to reply.

Discussion

No replies yet.