Validated cover image

The Future of Blockchain Privacy Tools

Validated

CHAPTER

The Importance of Distributed Computing in Privacy

In a world of a perfect guardian that is incorruptible, there is still the question of who accepts an inquiry as appropriate. So how does the network in this case decide which requests are worthy of complying and which requests are not? We can have varying degrees of what we do once we've identified an illicit actor, right? And so we can have low consensus requirements for just flagging the suspicious activity and super high ones regarding actually removing privacy entirely.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner