I said "without additional software". Running your own bridge is additional software.
Login to reply
Replies (1)
What I’m trying to say is the additional software part does not matter and you can use a bridge hosted by the dev or a public one in a way that doesn’t worsen the risk model (the client dev can backdoor and steal nuts anyway)