Can you give an example of how this would work? I would be very interested in a more trustless way to handle pegged tokens (in addition to many of the other things you mention in the post).
You are viewing a single comment's thread from:
Can you give an example of how this would work? I would be very interested in a more trustless way to handle pegged tokens (in addition to many of the other things you mention in the post).