Security
Confidential & authenticated inter-node and external communications
Privacy and anonymity
Selective node visibility
If it ain’t visible, it ain’t hackable…
Hard problem!
Decentralized security modes preferred
E.g., self-certifying names
Previous slide
Next slide
Back to first slide
View graphic version