I need to understand the timeline and some of the features and security assumptions of each of those things to design a protocol on the IC accordingly.
1 Like
I need to understand the timeline and some of the features and security assumptions of each of those things to design a protocol on the IC accordingly.