Kuleli Askeri Lisesi
38 Followers
End-to-end encryption of transaction inputs and state: no-one can see the data, not even node operators. @zama_fhe #ZamaCreatorProgram
Host Chains: the L1s and L2s that are supported by the Zama Protocol, and on which developers deploy their confidential dapps. @zama_fhe #ZamaCreatorProgram
Host Chains: the L1s and L2s that are supported by the Zama Protocol, and on which developers deploy their confidential dapps. @zama_fhe #ZamaCreatorProgram
In Base we trust