Content
@
0 reply
0 recast
0 reaction
stringtheory
@stringtheory69
How can zk tech be used to allow data to be purged from systems while tracking the provenance and history of relevant transformations (could be malicious) of data over time
2 replies
1 recast
2 reactions
stringtheory
@stringtheory69
https://youtu.be/d1XiIBiRSQ8?si=Gywh8fIV9Mkit-id Timestamp 21:00
0 reply
0 recast
0 reaction