But permissionless voting is vulnerable to governance attacks,
protocol complian attacks that can be mitigated through mechanism design
But permissionless voting is vulnerable to governance attacks,
protocol complian attacks that can be mitigated through mechanism design