how will you protect end users’ computers from malicious attacks?
The usage of end-users’ technical resources will be strictly limited to the provision of technical services such as networking or storage within carefully bounded limits. Network connections will be protected by uTP, a self-adjusting bandwidth mechanism which ensures applications throttle back if there is any indication of other apps (even on other devices) using the network connection. Storage will be encrypted and limited to a user-configurable maximum. Users will be able to configure which applications they accept and which they do not. The provision of BTTC services is limited to simple infrastructure operations and will in no way permit untrusted third parties to execute code on a user’s device.