https://nostr.build/i/nostr.build_da6322bda17071397fa8122d01e1ae286ab264df0f52b73cfdca19909b5fb04c.jpeg" class="embedded-image" loading="lazy">

Reply to this note

Please Login to reply.

Discussion

I think thats a rather wishfull simplification of reality. There are attack vectors that we are unaware of. Besides, If they can hijack every cellphone or windows pc in the world, I doubt the have issues with hijacking miners.