@heavenkey
@ethereum Looking for feedback from devs who’ve built complex Ethereum systems.
We’re using a Diamond architecture (EIP-2535) for an automated digital-inheritance protocol with inactivity proofs, encrypted heirs (AES-GCM on IPFS), and a fallback to public goods.
What’s the most critical security consideration you’d expect in such a design?