I think thats a rather wishfull simplification of reality. There are attack vectors that we are unaware of. Besides, If they can hijack every cellphone or windows pc in the world, I doubt the have issues with hijacking miners.

Reply to this note

Please Login to reply.

Discussion

No replies yet.