Close but we can simply link a protocol account to your phone and multiple other hw/people as 2fa, the endgame is a fluid mesh of multi-sig across any number of devices/peers with built-in inheritance and social recovery from the peers you've attested to 'trusting'

Reply to this note

Please Login to reply.

Discussion

No replies yet.