«This is a perfect real world example about why your idea of backdooring cryptosystems with a «secure golden key» is very bad!» (fortune.com)
Much of the material is inaccessible to the average reader because of a high degree of technical material (e.g.. On the Implementation of Pairing - Based Cryptosystems or Private Multiparty Sampling and Approximation of Vector... [more] (slaw.ca)
With their «Phoney» system which employs a threshold cryptosystem to encrypt the password hashes in the password file and honeywords to confuse attackers, even if the hackers have comprised a database, the phoney, honeywords, obfuscate and camouflage the genuine passwords. (sciencedaily.com)