Audrey Tang

You can instead use any ledger technology in a closed or at least everybody knows anyone who enters system. In that, you have more flexibility in choosing the kind of legitimacy mechanisms that hold each other accountable. I would argue that that kind of ledger is just a replica of centralized databases.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech