Closed chris-wood closed 2 years ago
We should describe how the origin name, mapping request, and token request are all bound together via the encrypted origin name, and why that's important.
This may have been overcome by events, so closing for now.
We should describe how the origin name, mapping request, and token request are all bound together via the encrypted origin name, and why that's important.