whitepaper
whitepaper copied to clipboard
Clarify attack mitigations
Re-organize to describe fundamental attacks and mitigations.
- Malicious computation, which is mitigated by zk-proofs
- Collusion against confidentiality, mitigated by tattle-tales and canary bounties
- Data withholding, mitigated by the safe shutdown protocol