Already in this trustless world, they develop ways to authenticate nevertheless with just digital signatures and some proof state or proof of work and so on. If you ask these people what are the ways to do computation in a way that doesn’t sacrifice privacy at all, because if just a little bit is on the blockchain, it’s on there forever, so they don’t accept this tolerable sacrifice.

Keyboard shortcuts

j previous speech k next speech