In the last piece, we covered the threat model. The paper lists the main ways a PoBU system can fail or be weakened in practice: issuer concentration, compromise/coercion, availability, and privacy/linkability.
Now comes the part many readers care about most:
What can we actually measure on a live