1 Matching Annotations
- Aug 2022
-
a16zcrypto.com a16zcrypto.com
-
But permissionless voting is vulnerable to governance attacks,
protocol complian attacks that can be mitigated through mechanism design
-
But permissionless voting is vulnerable to governance attacks,
protocol complian attacks that can be mitigated through mechanism design