minus-squareWidget@kbin.socialtoTechnology@beehaw.org•Lemmy needs two things to be successfullinkfedilinkarrow-up3·1 year agoI would assume the same way any other system with untrusted nodes works: with the client authenticating by use of a cryptographic signature on everything they submit. linkfedilink
I would assume the same way any other system with untrusted nodes works: with the client authenticating by use of a cryptographic signature on everything they submit.