In this lesson, I describe methods of protecting and safely using private and symmetric keys, including secure key generation, separation of duties, dual control, and split knowledge. You can download the script for this video at the beginning or the end of the video.











