top | item 47127492

(no title)

EmbarrassedHelp | 8 days ago

Only in theory, and only if you blindly trust a third party. The implementations in practice are still massive privacy violations.

discuss

order

alvatar|7 days ago

what third party do you need? The program can be opensource. The verification can be done onchain