Move mouse, type on keyboard, resize window for privacy-preserving entropy collection...
Privacy-preserving collection: mouse movement deltas, keyboard timing, window size buckets, touch coordinates (quantized). All data processed asynchronously with SHA3-512 + KMAC256 mixing.
2. Encrypt / Decrypt Files
3. Build / Restore .qcont Shards
n=?, k=?, m=?, t=?; Need ≥ t shards to restore. ℹ
Data k
Parity m
Threshold t
Configuration Tips
More availability = reduce k or t;
More confidentiality = increase m.
If someone controls t shards they can decrypt; with fewer than t shards they cannot.
m — in the context of RS is the number of redundant parity shards.
t — in the context of SSS, this is the threshold: the minimum number of Shamir shards required to recover the secret (private key).