that’s not how threat modeling works but yes there will be shitty options since people can build on nostr without permission
using open protocols effectively requires personal responsibility
that’s not how threat modeling works but yes there will be shitty options since people can build on nostr without permission
using open protocols effectively requires personal responsibility
No replies yet.