Anyone else worried about predatory actors creating liquid network-esque replicas and baiting people into the network, then rugging the users now that the functionary code is out ? 🤔

Reply to this note

Please Login to reply.

Discussion

No replies yet.