1. The document discusses how blockchain technology can be used to block or exclude people in digital systems and databases. 2. Key points made include keeping statistics on how often people are blocked, passing blocking techniques between entities in a chain, and everyone knowing a list of people to exclude and needing to sync that list. 3. The conclusion warns that like whale watching, one only sees the tail, and tail risk must be managed.