Links

Threshold Access Control (TAC)

Use Threshold Access Control for end-to-end encrypted, end-to-end decentralized data sharing and communication. See Threshold Access Control in the Fundamentals section for an overview of the key concepts and value propositions.