24
A’s Up
24e0dcd0499bb63ca55a736a2c3ee9ed6b2da29baee4bd83f6f03b0183cc23a9
Let’s do this thing
1) limits of privacy steps as it relates to threat models
ie: limit of a privacy phone as it relates to a government level adversary
2) avoid the esoteric/philosophical takes about Bitcoin. There’s already plenty of that
3) outline one practical step people can take at the end of the newsletter so the reader can put the post into action