What is the solution?
What is the solution?
Login to reply
Replies (1)
I would advocate for consensus changes to fix known exploits. Plus as many known theoretical attack vectors as possible.