🤌

"Employing these techniques to safeguard valuable digital assets is as routine and mundane and free of illicit purpose as using two-factor authentication to secure a digital wallet containing payment card information or an X (formerly Twitter) account to prevent an unauthorized announcement."

nostr:nevent1qqsdjh76xurgwkq2mn8s4g82q5hz0je4zx6cpq5a0l5mk4vm9fxgpxqpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqpxfzhdwlm3cx9l6wdzyft8w8y9gy607tqgtyfq7tekaxs7lhmxfqvzqqqqqqyrcktgk

Reply to this note

Please Login to reply.