and micro ai. which essentially is what micro apps are... individually or small group controlled mining apparatus backends with "useful" fronts, mostly for unwitting customers.

but it's still the hardware: the hardware is designed to be leaky to allow for this mining to operate.

Reply to this note

Please Login to reply.

Discussion

No replies yet.