Closed johnx25bd closed 2 months ago
Proposal for a simple authority-based verification strategy including user roles, required interfaces, necessary EAS schemas, user workflows and pseudocode implementations of key software.
Proposal for a simple authority-based verification strategy including user roles, required interfaces, necessary EAS schemas, user workflows and pseudocode implementations of key software.