I think, within those three programs, one need to position this technology appropriately. If it’s the first part, the smaller scale, easier to allocate subsidizing or sponsoring program, one would naturally ask, "Have you done any serious mathematical proof of how many nodes in IOTA network, once they’re compromised, compromise the whole network?"

Keyboard shortcuts

j previous speech k next speech