Also, if you adopt that as a substrate, you kind of always have to go back to the first principles of zero-knowledge and zero-trust authentication.
j previous speech k next speech