Comment by EmbarrassedHelp
3 days ago
Only in theory, and only if you blindly trust a third party. The implementations in practice are still massive privacy violations.
3 days ago
Only in theory, and only if you blindly trust a third party. The implementations in practice are still massive privacy violations.
what third party do you need? The program can be opensource. The verification can be done onchain