Replies (1)

What I’m trying to say is the additional software part does not matter and you can use a bridge hosted by the dev or a public one in a way that doesn’t worsen the risk model (the client dev can backdoor and steal nuts anyway)