Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Is there any simple explanation or walk-through of a diagram showing how Tide works?

There are several bits in the article about how Tide and TideCloak demonstrates that authorityless auth works, but I'm not finding an explainer.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: