Hacker News new | past | comments | ask | show | jobs | submit login

The most popular identity programs in the early days will have no backup or centralized backup. As more people establish identities, decentralized backups will be more feasible.

As the ecosystem iterates on identity programs, we'll converge on secure, reliable, decentralized backups.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: