Recover involves users’ private keys being encrypted, duplicated and divided into three pieces which are held with three different parties.
Original Source
Recover involves users’ private keys being encrypted, duplicated and divided into three pieces which are held with three different parties.
Original Source