Last updated 3 years ago
Here we try to represent some of the design choices between phase 1 and phase 2:
Single or multi-source
Identification and authentication
Data storage
Phase 1
Phase 2