Last updated 2 years ago
Can be based on:
permissions,
tokens.
Various coordinators.
Access is attributed to the majority of votes.