a promising vision for redefining the way people build and use open, permission-less networks
- Trust is the premises of permission-less networks
- Integrity with reoccurring timestamps (temper-proof from eavesdroppers)
- Verity is based on legibility from origin; (consensus is manipulate-able; the former isn't...) 
- Weights are based on origin + accordance with the general populace @timep_stamp_here = final output. 
- Source code should be reverse-able; while remaining void of (non-fungible -> "intellectual property") 
- Intrusion is detected when verity via the permission-less system returns ERROR! (-ADDR_VOID_AUTH-) 
 

 
    
Top comments (0)