Three rules for my own sovereignty.

1. I generate my own private key.

2. I encrypt my personal data.

3. I verify the code I use.

Reply to this note

Please Login to reply.

Discussion

All of the code? Seems like an unattainable goal. The first two are much more doable.

Yeah, the third is the hardest.