Hey there, I have a pretty simple question about Qubic.
Is it possible that a person accessing a Qubic does not know what the program that the Qubic is processing looks like? To prevent access to a Qubic, one can intervene Oracles, who demand a certain proof of identity. However, once the user gains access to the Qubic, is it still possible to prevent that the user can not simply copy the Qubic's code?
(no comments yet)