The question is: Is it possible to create a private, trustless, safe, second layer protocol?

Let's just say that I am not impressed with Lightning.

Reply to this note

Please Login to reply.

Discussion

No replies yet.