From dd319cedd943e7cac7b4f11dfd4e420f75b19d5e Mon Sep 17 00:00:00 2001 From: Aayush Gupta <60979345+AAYUSH-GUPTA-coder@users.noreply.github.com> Date: Thu, 16 Feb 2023 12:18:36 +0530 Subject: [PATCH] Typo corrected "can by" to "can be" --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 6c0394b..4cdafa7 100644 --- a/README.md +++ b/README.md @@ -54,7 +54,7 @@ Claim | bounty hunter | claim the incentive to complete the cycle ### Example variants in terms of building blocks * A simple data DAO can be implemented with a client that adds the bounties through a voting mechanism -* Perpetual storage contracts can by implemented with clients that funds deals with defi mechanisms and recycle cids from expiring deals into their authorization sets +* Perpetual storage contracts can be implemented with clients that funds deals with defi mechanisms and recycle cids from expiring deals into their authorization sets * Trustless third party data funding can be implemented with 1) public ability to list the bounty 2) a funding mechanism that associates payments with particular cids