@jzxchiang I missed your first question, about the VM build and malicious boundary nodes. This is covered more thoroughly in the Decentralized CA and DNS and TEE Enhanced IC proposals, but yes – this is definitely something we think about and would like the community to discuss and drive forward.
1 Like