Joint Controllership: In permissionless settings, every node risks controller status. Practical mitigation includes protocol-level role splits or voluntary codes of conduct to limit who truly controls personal data.