Posts tagged trusted hardware

We explore the space of trust-minimizing coordination mechanisms for on-chain vote buying and exploitation in the permissionless model.