as I read on the system architecture , Tiger Beetle doesn't support authentifications so untrusted user should hands off from the Tiger . the problem is how to verify user are trust worthy or not to interact with tiger beetle ? thoughts ?
Discussion
users are not interacting with tigerbeetle directly
Of course yes , the bookkeeper or person in charged probably interact with it .
The hardware probably something like this using NVMe drives and no requirement for RAID ( redundant array of independent disk )
This image created using prompt from the description on tiger beetle hardware .. pretty cool eh ..
