We’ve engaged some security research firms. We also have cryptographic researchers. We have lots of mathematicians dealing with the network security and attacks. In our white paper, we outline a number of attacks and how they’re possible.

Keyboard shortcuts

j previous speech k next speech