that’s not how threat modeling works but yes there will be shitty options since people can build on nostr without permission

using open protocols effectively requires personal responsibility

Reply to this note

Please Login to reply.

Discussion

No replies yet.