Too Long; Didn't Read
Crypto technologies are often referred to as “trustless.” While often cited as one of their defining features, the label can actually be quite confusing. How can something that’s “trustless” be used for activities that typically require trust?