In section 5.8 of his thesis he proposes what he calls an electro-cyber dome security system. He describes it as a firewall-style API that requires all control actions to be tied to reusable proofs-of-work. Here's the PDF and you can read that section in detail.

https://drive.google.com/file/d/15uMzo9qbV-GY4xNH7ZhenXuE_q5xO4ZL/view?usp=drivesdk

Reply to this note

Please Login to reply.

Discussion

No replies yet.