a promising vision for redefining the way people build and use open, permission-less networks
- Trust is the premises of permission-less networks
- Integrity with reoccurring timestamps (temper-proof from eavesdroppers)
Verity is based on legibility from origin; (consensus is manipulate-able; the former isn't...)
Weights are based on origin + accordance with the general populace @timep_stamp_here = final output.
Source code should be reverse-able; while remaining void of (non-fungible -> "intellectual property")
Intrusion is detected when verity via the permission-less system returns ERROR! (-ADDR_VOID_AUTH-)
Top comments (0)