I guess what I’m wondering is, is anybody exploiting those loops? Have you experienced any bad actors in there trying to get inside the loops and corrupt them in any way?
j previous speech k next speech