How does that even work as a pretext anyway? How does a cyberattack imply CBDCs?

Reply to this note

Please Login to reply.

Discussion

Never answer questions people already think they know the answer to.