How does Everest govern the data of users to prevent misuse by their 3rd party clients?Can you please explain that part abit more?
The data on the supernodes are secured with the users public/private keypair, biom-
etry, as well as a password/PIN. There is no ability to DDOS the Everest infrastruc-
ture as it is decentralized, has a financial disincentive in fees charged for transactions,
and API requests are funneled through a queueing regulator. This ensures equal ac-
cess to the services and mitigates potentially negatively-impacting usage or load.
That part right there, about decentralization, that is one of the most important parts in strengthening security, but some projects forget that and claim they are decentralized without really being decentralized.