- On security: Coinbase lists tokens vulnerable to multisigs and custodians, common exploit targets. THORChain’s distinct architecture includes:
→ Decentralized vaults
→ Permissionless nodes
→ Economic security
→ No KYC, no middlemen
→ Decentralized vaults
→ Permissionless nodes
→ Economic security
→ No KYC, no middlemen