Discussion about this post

User's avatar
James Prohaska's avatar

Good article but don't understand how you can have authenticated. authorized and secure financial transactions in a "trustless" environment. Would you please explain further??

Expand full comment
2 more comments...

No posts