Last updated 1 year ago
Can be based on:
permissions,
tokens.
Various coordinators.
Access is attributed to the majority of votes.