Recover involves users’ private keys being encrypted, duplicated and divided into three pieces which are held with three different parties.
Recover involves users’ private keys being encrypted, duplicated and divided into three pieces which are held with three different parties.