I’ve seen ingenious cryptographers deploy centralized infrastructures, despite creating excellent cryptography.
Thinking about the ways a system can be attacked is different than just tailoring math.
Distributed systems design is polymathic, from the CAP theorem to game-theory.
Login to reply