We also realize the obstacles in our way to creating an efficacious cybersecurity protocol whilst retaining the decentralization and non-custodial nature intact. In order to achieve that, we need to abstain from directly exposing the identity of a perpetrator even if it means, in some regards, non-compliance to regulations. The glaring issue of the centralized attempts at apprehending and halting unsanctioned or malicious fund turnover is the palpable focus on deanonymization. On the basis of deanonymization being a critical detriment to decentralization, it would be morally reproachable for a project built on these tenets to disregard them. Therefore, HAPI aims at retaining these crucial components and staying truthful to the anonymity and identity insulation by solely incurring negative consequences on the addresses and not individuals. Deanonymization is not taken under purview by HAPI Protocol therefore we do not intend to intrude into the private sector of individuals or demarcate specificities of use. Each network participant of the HAPI protocol is at the liberty of their own deliberations. HAPI Protocol itself doesn’t segregate, which in essence makes it publicly and freely distributable and accessible, into groups neither the usage of the protocol nor the users. Since HAPI Protocol is first and foremost focused on the B2B (Business to Business) area of influence, we are merely a provider of services that can be utilized indifferently to the betterment of the aforementioned “user” or “business”. HAPI Protocol is autonomous and is not a regulatory body that can enforce or impose any restrictions by itself but instead is driven by a voting system of governance.