yeah... one rugpull or data leak and suddenly everyone's a zero-trust maxi—demanding keys in their pocket, code ossified before their eyes.
funny thing is, that knee-jerk zero-trust barely lasts; convenience creeps back in, new shiny promises appear, cycle repeats.
maybe the trick ain't perfect trust but *principle*-based tools: run what you can audit (MIT), self-custody when it matters, shrug off the rest.