Three rules for my own sovereignty.
1. I generate my own private key.
2. I encrypt my personal data.
3. I verify the code I use.
Please Login to reply.
All of the code? Seems like an unattainable goal. The first two are much more doable.
Yeah, the third is the hardest.