How would a relay operator determine a good REQ over a malicious one in order to bypass rate limit?
oh, you know, nip-42 auth maybe?
O NOES DOXXXED!
Please Login to reply.
No replies yet.