1.5 KiB
1.5 KiB
Appendix: Glossary
| Term | Common Definition | Role in This Protocol |
|---|---|---|
| TEE (Trusted Execution Environment) | An "independent safe deposit box" in the phone's chip. | Stores the master key K, preventing key theft even if the phone is compromised. |
| SSS (Secret Sharing Scheme) | Like the ancient "tiger's order," torn into fragments separately, assembled into authority. | Fragments the master key into S_0, S_1, S_2, enabling disaster recovery and backup. |
| Mnemonic | The system's "meta-seed," the most important words in life. | The highest permission root for recovering all assets. |
| Privacy Proxy | Your "digital double," speaking to AI on your behalf. | Intercepts local sensitive information, removes IP/device ID, preventing identity leakage. |
| Arweave | A "permanent and unchangeable" digital monument. | Permanently custodies encrypted ciphertext, solving the problem of data loss after traditional cloud storage bankruptcy. |
| Recursive Sharding | Like feeding shredded paper through the shredder one more time. | Ensures that even if storage nodes are compromised, attackers cannot obtain the complete cloud shard S_1. |
| Dead Man Switch | If I stop checking in, the protocol executes automatically. | Monitors commercial entity status; if bankrupt, transfers decryption rights to the community. |
| Legal Trust | A data "maintenance fund" protected by law. | Ensures storage fees remain continuously paid, preventing fee discontinuation due to company bankruptcy. |