In the refugee context, identity, data protection, making sure that it is borderless, building trust, making sure we can deploy zero-knowledge proofs, there are a lot of techniques to make this even more secure.”
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
In the refugee context, identity, data protection, making sure that it is borderless, building trust, making sure we can deploy zero-knowledge proofs, there are a lot of techniques to make this even more secure.”