Also, if you adopt that as a substrate, you kind of always have to go back to the first principles of zero-knowledge and zero-trust authentication.

Keyboard shortcuts

j previous speech k next speech