diff --git a/rlog/2023-08-28-Nescience.mdx b/rlog/2023-08-28-Nescience.mdx
index 2e554645..c7d68b04 100644
--- a/rlog/2023-08-28-Nescience.mdx
+++ b/rlog/2023-08-28-Nescience.mdx
@@ -404,13 +404,13 @@ and conducive to the objectives of user-initiated proof creation, incentivized v
-| Aspect | Details | |
-|------------------------------- |------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |--- |
-| **Design Principle** | - **User Responsibility:** Generating proofs for private state updates. - **External Prover:** Delegated the task of verifying proofs and executing public VM functions. | |
-| **Trust & Privacy** | - **Minimized Trust Assumptions:** Place proof generation in users' hands. - **Enhanced Privacy:** Ensure confidentiality of private transactions and prevent information leakage. | |
-| **Incentivization Framework** | - **Rewards:** Compensate honest behavior. - **Penalties:** Deter and penalize dishonest behavior. | |
-| **Economic Considerations** | - **Verification vs. Execution:** Make verification more cost-effective than execution to prevent spurious proofs flooding. - **Cost Balance:** Strengthen resilience against fraudulent activities and maintain efficiency. | |
-| **Outcome** | An ecosystem where: - Users' privacy is paramount. - Incentives are appropriately aligned. - The system is robust against adversarial actions. | |
+| Aspect | Details |
+|------------------------------- |------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
+| **Design Principle** | - **User Responsibility:** Generating proofs for private state updates. - **External Prover:** Delegated the task of verifying proofs and executing public VM functions. |
+| **Trust & Privacy** | - **Minimized Trust Assumptions:** Place proof generation in users' hands. - **Enhanced Privacy:** Ensure confidentiality of private transactions and prevent information leakage. |
+| **Incentivization Framework** | - **Rewards:** Compensate honest behavior. - **Penalties:** Deter and penalize dishonest behavior. |
+| **Economic Considerations** | - **Verification vs. Execution:** Make verification more cost-effective than execution to prevent spurious proofs flooding. - **Cost Balance:** Strengthen resilience against fraudulent activities and maintain efficiency. |
+| **Outcome** | An ecosystem where: - Users' privacy is paramount. - Incentives are appropriately aligned. - The system is robust against adversarial actions. |