> just keep the key on a USB or file store of any kind
Similar arguments could be made against this too: trusted contacts need to make sure the USB isn't damaged or lost and that the files haven't been corrupted. At the end of the day, these types of recovery flows require some level of engagement which in itself is an issue since human beings are very flawed.
Similar arguments could be made against this too: trusted contacts need to make sure the USB isn't damaged or lost and that the files haven't been corrupted. At the end of the day, these types of recovery flows require some level of engagement which in itself is an issue since human beings are very flawed.