
#37 - Uma Roy
The Network State Podcast
00:00
Succinct's provable technology stack
Uma outlines capture, edit, publish, consume stages where cryptographic proofs create a chain of custody.
Play episode from 26:09
Transcript

Uma outlines capture, edit, publish, consume stages where cryptographic proofs create a chain of custody.