Joanna Rutkowska @rootkovska
In general solutions would fall into: 1. Try to make plugins non-malicious (white-listing, safe-compiling, constrained API), 2. Assume plugins are malicious and sandbox (prevent I/O to Internet, etc), 3. Build in an inevitable punishment mechanism for offenders (e.g. staking) — PolitiTweet.org