Protecting the crypto stash with Multi-signature, Multi-Party-Computation, and HSMs: Part II
This is the second in a series of posts exploring the various approaches to safeguarding crypto assets. In the first post we explained our method and looked at the most common attack vector – physical access. This post goes into the other, more..