![Profile Image](https://pbs.twimg.com/profile_images/1489208350814490624/r9sE3UUT_normal.jpg)
Joanna Rutkowska @rootkovska
In general solutions would fall into: 1. Try to make plugins non-malicious (white-listing, safe-compiling, constrained API), 2. Assume plugins are malicious and sandbox (prevent I/O to Internet, etc), 3. Build in an inevitable punishment mechanism for offenders (e.g. staking) — PolitiTweet.org