Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 0 additions & 1 deletion src/content/docs/how-it-works/creating-your-identity.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,6 @@ This approach provides stronger security than traditional systems:

- **No Password Database**: There's no central database of passwords to be breached
- **No Identity Theft**: Your identity can't be stolen from a third party because no third party stores it
- **Forward Secrecy**: Even if a device is compromised, past communications remain secure
- **Cryptographic Proof**: Your identity is mathematical fact, not corporate assertion

The trade-off is responsibility: you must securely store your encrypted keys and remember your password. There's no customer support to call if you lose access - but there's also no company that can lock you out of your own identity.
Expand Down