"Imagine you are a software program, and you want to hold bitcoin. What are you going to do with your private key, such that the person who is running the computer you are on can't get it?"

1. I could hide undetected in the system as a worm, maybe being part of a botnet

2. I could have permission from the system owner to do whatever I want with little or no oversight

Reply to this note

Please Login to reply.

Discussion

No replies yet.