| ▲ | hbbio 2 hours ago | |
Thx for the explanation! Side thought as we're working on 100% onchain systems (for digital assets security, different goals): Public chains (e.g. EVMs) can be a tamper‑evident gate that only promotes a new config artifact if (a) a delay or multi‑sig review has elapsed, and (b) a succinct proof shows the artifact satisfies safety invariants like ≤200 features, deduped, schema X, etc. That could have blocked propagation of the oversized file long before it reached the edge :) | ||