I’m exploring a both/and approach… cryptographic defense at the protocol level, paired with source-code-rooted equity and trust law as an outer firewall.

Reply to this note

Please Login to reply.

Discussion

No replies yet.