minus-squarefirefueled@lemmy.worldtoYou Should Know@lemmy.world•YSK: Your Lemmy activities (e.g. downvotes) are far from privatelinkfedilinkEnglisharrow-up1·1 year agoIf you’re a programmer, you’d know there are ways to authenticate a transaction without giving away giving aways, or storing, the person who initiated the transaction. It’s more difficult to do of course. So it’s often not done. linkfedilink
If you’re a programmer, you’d know there are ways to authenticate a transaction without giving away giving aways, or storing, the person who initiated the transaction. It’s more difficult to do of course. So it’s often not done.