Password manager recovery
Recommended: k=2, n=3. Two locations you control, plus one off-site fallback.
Use cases are not just “what k/n should I pick?”. They are about people, logistics, and what you can actually pull off when recovery matters.
Use this page to pick a plan you can execute under pressure: who holds which share, what happens if someone is unavailable, and how you’ll practice recovery.
Password manager recovery
Recommended: k=2, n=3. Two locations you control, plus one off-site fallback.
Family / executor planning
Recommended: k=2, n=4. Recovery without any single person holding full access.
Small team infra secret
Recommended: k=3, n=5. Split across roles, plus one offline vault.
Break-glass procedure
Recommended: k=2, n=4. Keep one share offline; require two parties during incidents.
Two-factor backup codes
Recommended: k=2, n=3. Store shares so a single device compromise doesn’t disable 2FA.
Agency / client handoff
Recommended: k=2, n=3. Split between agency vault, client vault, and a sealed offline copy.
Good for password manager recovery keys, 2FA backup codes, and other personal secrets.
Suggested distribution:
Good when you want separation of duties: no one person can act alone, but the team can still recover during an incident.
Suggested distribution (by role):
Good when recovery should be rare and auditable.
Suggested distribution:
Prefer independent failures
Different people, devices, and locations. Avoid “same safe, two envelopes”.
Design for the worst day
Recovery happens when you’re stressed: outages, travel, illness, or loss.
Write down the runbook
Document who has each share and what to do if a holder is unavailable.
If the risk of share theft is high (travel, shared environments, hostile endpoints), add a passphrase. That changes the attack from “steal k shares” to “steal k shares and the passphrase”.
See Security.