hackers building on permissionless protocols will out-execute every company over time.
i’m 50/50 on either this, or in 2-3yrs it has the same penetration as ppl using a linux based OS
Please Login to reply.
No replies yet.