While some criteria (e.g., permissionless access, self-custody, and FLOSS) are straightforward binary determinants for deployment, others are more complex.