Holiday Surprise: Dr. Leemon Baird on Decentralized Recovery and Custody – The Private Key to Mass Adoption

Almost everyone has been subject to multi-factor authentication before, whether it was having to confirm a code sent to your phone or email address or having to answer an additional security question after inputting your password. However, a new form of web security called decentralized recovery and decentralized custody is now on the horizon.

How do decentralized recovery and custody offer security to web users and what makes them different from multi-factor authentication?

On today’s episode of Gossip About Gossip by Hedera, podcast Host and SVP Communications, Swirlds Labs, Zenobia Godschalk, speaks with Dr. Leemon Baird, Co-CEO, Swirlds Labs and Founder and CEO of Swirlds Inc., to discuss how Web3 ledgers and blockchains lack security and what decentralized recovery can do to address this insecurity.

Godschalk and Dr. Baird also discussed…

  1. How decentralization lacks security via Web3 ledgers and blockchains
  2. What decentralized recovery and decentralized custody are and their use cases
  3. The four Internet protocols essential for instilling and recruiting decentralized recovery and custody “helpers”

Dr. Baird explained how decentralized recovery works: “When you have enough helpers, your key—your secret—is shared among all of them in pieces. None of them can see your secret. And any half of them can recover it. That’s decentralized recovery.”

Dr. Leemon Baird is Co-CEO, Swirlds Labs and Founder and CEO of Swirlds Inc. Dr. Baird has served as Founder/CEO of Hedera Hashgraph, Senior Research Scientist for the Academy Center for Cyberspace Research ,and Professor of Computer Science at the United States Air Forcce Academy. He holds a BS in Computer Science from the United States Air Force Academy and a Ph.D. in Computer Science from Carnegie Mellon University.

Recent Episodes

In today’s fast-evolving security landscape, intelligent video management is no longer a luxury—it’s a necessity. AMAG’s Symmetry CompleteView Video Management System rises to meet this demand with a powerful, scalable solution that adapts to organizations of any size. Designed with open architecture and user-friendliness at its core, the system offers seamless integration and effortless deployment….

In today’s fast-paced, security-conscious environment, managing who has access to what—and when—is more critical than ever. That’s where Symmetry CONNECT Identity Management by AMAG comes in, offering a powerful, streamlined solution for physical identity and access management (PIAM). With growing compliance demands and increasingly complex workforces, organizations need tools that can automate onboarding, simplify credentialing,…

In the world of security technology, vision has long taken precedence—cameras, analytics, and access control have dominated the conversation. But what if we’ve been underestimating our oldest, most human sense of communication: voice? The rise of intelligent audio in security systems marks a turning point in how we protect spaces and people, shifting from…