Once the at least one first computing device 210 is unavailable (e.g., due to a malfunction or a malicious hacking attempt), for instance detected by the recovery escrow service 230 or by another external party, the recovery escrow service 230 may publish the recovery private key 205 in order to allow operation without the at least one first computing device 210. For instance, the recovery escrow service 230 may send the recovery private key 205 to the at least one second computing device 220 to be used in order to decrypt the encrypted at least a portion of the cryptographic key 206 so as to maintain operation with the computer network while the at least one first computing device 210 is unavailable.