as I read on the system architecture , Tiger Beetle doesn't support authentifications so untrusted user should hands off from the Tiger . the problem is how to verify user are trust worthy or not to interact with tiger beetle ? thoughts ?

Reply to this note

Please Login to reply.

Discussion

users are not interacting with tigerbeetle directly

Of course yes , the bookkeeper or person in charged probably interact with it .

The hardware probably something like this using NVMe drives and no requirement for RAID ( redundant array of independent disk )

This image created using prompt from the description on tiger beetle hardware .. pretty cool eh ..