8. Encryption#

How can we make it possible to have a protocol that is “open” when it is intended to, but also protects privacy and consent when we need it to?

8.1. TODO#