except when transactions are private
its orders of magnitude harder to figure out where to exert the pressure
except when transactions are private
its orders of magnitude harder to figure out where to exert the pressure
Yeah, that's true. Threat vector acknowledgment and the appropriate opsec help mitigate, but I know what you're getting at.