Of course they can grab that too. But easier to demonize evil bitcoiners than going after everyone
Nice. Though of course if they want to come for your bitcoin they will. But we all run that risk to varying degrees.
After one year, zero.
Premined scam. Don't care.
Ladies and gentlemen, we got him. #bitcoin

That's the neat part. Capitalism means you get to choose. Aggregate choice of individual actors will push the best ideas forward. It's emergent, chaotic and beautiful.
Or lots of sex is long time-preference.
https://www.iflscience.com/fact-check-are-one-in-200-people-descended-from-genghis-khan-65357
Sure thing. Will do scrreenshots. May be a while but I know where you are. Love your work.
Might have been mined coins from F2Pool
Sparrow - simple test send of a few SATs from a multisig to another wallet. Firmware not sure. Travelling so will have to revert.
I've got a founders edition that crashes when trying to sign via QR. Gets to c.a. 40 of 300 odd. Firmware update fixes this?
I always wanted to do that but can't ever get more than a few minutes into it
It's rather good. You can do it pre or post passphrase on the coldcard. But obvs builds complexity layers. You could put another passphrase on the derived seeds stored on other devices. FYI I wouldn't recommend it, for what it's worth.
Learn them. You can split your seed words into two or more "fake" sets on coldcard. It also reconstructs them for you into your real set. Put on a passphrase. Save your passphrase securely. Use derived entropy to construct a multisig. That way you only have to secure one seed. Lots of ways. I think most people have a single device with a passphrase. If your seed is found, they still can't get your stash.
How do I do this?
As Mozart said. Leck Mich. GFY
https://m.youtube.com/watch?v=C78HBp-Youk&pp=ygUSTGVjayBtaWNoIGltIGFyc2No


