Another title could be, how does the network get reliable large-scale data from an obscured network?
The reason I ask goes back to the issue of building bridges between separate instances of the Safe network.
Because if there is a way to evaluate the “strength” of the Safe network, then shouldn’t there be a way to evaluate the “strength” of the isolated network?
I mean one of the truly amazing things about the Argentine ant colony, is that when you bring together its descendants, they act as one colony right?