Torus splits a user’s private keys into shares across a network of nodes, and allows a user to retrieve this using natural login mechanisms like social authentication. One needs more than half of the shares to reconstruct the private key
No they do not. Please refer to Q1 to understand how a private key is being stored.
It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part. To reconstruct the original secret, a minimum number of parts is required. In the threshold scheme this number is less than the total number of parts. Otherwise all participants are needed to reconstruct the original secret.
A user's private key shares aren't stored on the blockchain, so even if the blockchain is "hacked" and the data on it is leaked, it doesnt affect user's keys. Hence, we live it up to users on their decision to have a secondary external backup for their keys. But there is no need to, really.
No, we will not.
We use it for identification. All the user login data is encrypted. We do not sell or distribute any user data.
Each OAuth is tied to a unique Ethereum address.
Torus allow more node operators to join freely, so that this system can be even more decentralised. there is a whitelist process, please reach out at email@example.com
If you have any questions that are yet to be addressed here, feel free to contact us via email at firstname.lastname@example.org or on Telegram at https://t.me/TorusLabs.