BTW, these algo. weren't also called "Shamir's Secret Sharing" algorithms? ;-)
Of course, it also implies that the target systems are disimilar and do not have the same vulnerabilities... But we love diversification in the open source world (all the Linuxes + all the BSDs...), don't we? And we are all very eager do redo things differently a few times (for personal ego reasons).
Time to claim for better security in the open source world than in the closed source world for the right (marketing) reasons!
(And no, I won't count virtual machines as diversification. I am old-fashioned - or not enough old-fashioned as you prefer.)
Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds