1 2 3 4
* splitting large secret keys * prompt for name that is less obviously connected to user * tune hashes on more powerful hardware than thermal throttling laptop * store to servers