jb55
· 41w
I have started this project. a new minimal and easy to run custodial NWC wallet node.
will be using tigerbeetle for an indestructible accounting db. auditable.
extremely minimal attack surface. smal...
as I read on the system architecture , Tiger Beetle doesn't support authentifications so untrusted user should hands off from the Tiger . the problem is how to verify user are trust worthy or not to interact with tiger beetle ? thoughts ?