You got to hash the image so no one can alter the original intent or add exploits to the image. The hash can be looked up on cacheable media, e.g. IPFS

Reply to this note

Please Login to reply.

Discussion

No replies yet.