diff --git a/src/content/docs/how-it-works/creating-your-identity.mdx b/src/content/docs/how-it-works/creating-your-identity.mdx index 2e2ddb9..1b62d1f 100644 --- a/src/content/docs/how-it-works/creating-your-identity.mdx +++ b/src/content/docs/how-it-works/creating-your-identity.mdx @@ -67,7 +67,6 @@ This approach provides stronger security than traditional systems: - **No Password Database**: There's no central database of passwords to be breached - **No Identity Theft**: Your identity can't be stolen from a third party because no third party stores it -- **Forward Secrecy**: Even if a device is compromised, past communications remain secure - **Cryptographic Proof**: Your identity is mathematical fact, not corporate assertion The trade-off is responsibility: you must securely store your encrypted keys and remember your password. There's no customer support to call if you lose access - but there's also no company that can lock you out of your own identity.