Closed eckelcu closed 2 years ago
Sean shared, "Just about any network can be exploited. With this experiment we have put in some security but the idea it to have as open of a network as we can just like at an in person meeting. A user has to have a data tracker account to make use of the network and we expect people to respect it just a we would an in person meeting. If something is exploited address it just as we would at a meeting. "
Addressed by #21
Hi Chairs, Charles,
Excellent document! Fully support - READY with a few nits!
Thanks! Dhruv