In chapter 12, the author introduces issues to address when integrating blockchain apps with legacy applications. Which of the differences between blockchain and legacy systems discussed in chapter 12 do you think would be the one that carries the most risk? How could this risk be realized? (Give at least 2 examples). Briefly describe how you would address this risk in your blockchain app design.
Think of three questions you’d like to ask other students and add these to the end of your thread.