1) limits of privacy steps as it relates to threat models

ie: limit of a privacy phone as it relates to a government level adversary

2) avoid the esoteric/philosophical takes about Bitcoin. There’s already plenty of that

3) outline one practical step people can take at the end of the newsletter so the reader can put the post into action

Reply to this note

Please Login to reply.

Discussion

No replies yet.