In short, JLINC updates the pre-Internet, static “notice and consent” paradigm, with a dynamic, state-of-the-art protocol. At the end of the day, JLINC’s permissioned data protocol harnesses the energy of engaged users to drive new markets.
Alice and Bob are the primary characters in a cast of characters first used in cryptographic circles as placeholder names to represent different parties in a transaction. The story goes like this...