Too Long; Didn't Read
Many people have come up with elaborate ways for a trustless, decentralized, <a href="https://hackernoon.com/tagged/internet" target="_blank">internet</a>. However, these methods essentially take a sledgehammer to the current internet’s protocols to shape it into what they want. I have learned that if something is forced to do something it was not built to do, problems will arise when changes have to be made. Many problems arise that would have not if the system was redesigned to fit the demand of the system.