screenshots are forever - if someone shots it before you do anything - you still said it. and public keys are traceable eve if they are abandoned. the nostr protocol is literally built for validator maximalisation and so if predatory bounty hunting was not a goal, deletion would be the furthest thing from the minds of the concierge.

Reply to this note

Please Login to reply.

Discussion

No replies yet.