Add illustration for Shamir's scheme (maybe something like [1])
Add illustration for Blakley's scheme (maybe something like [2])
Explain "Why is trivial secret sharing not good enough?"
Expand or merge sections to avoid one-paragraph-section syndrome
Rework "limitations of secret sharing schemes" section to be more rigorous
Update with discussion and or links to recent work in game theoretic approaches, rational secret sharing, and k-resilient Nash equilibrium in secret sharing protocols