Anyone else worried about predatory actors creating liquid network-esque replicas and baiting people into the network, then rugging the users now that the functionary code is out ? 🤔
Please Login to reply.
No replies yet.