pubkeyと登壇者の紐づけが出来る規模感のコミュニティなの面白いよな
Please Login to reply.
In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?