How does Everest govern the data of users to prevent misuse by their 3rd party clients?Can you please explain that part abit more?
The data on the supernodes are secured with the users public/private keypair, biom-
etry, as well as a password/PIN. There is no ability to DDOS the Everest infrastruc-
ture as it is decentralized, has a financial disincentive in fees charged for transactions,
and API requests are funneled through a queueing regulator. This ensures equal ac-
cess to the services and mitigates potentially negatively-impacting usage or load.