Avatar
Damus
c575f51ad821202e1439e22008db81e96586c136a2f967650173cfc6912a1c26
Hello,Nostr!

In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?

In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?

In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?

In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?

In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?

In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?

In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?

In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?

In that case. Pick a social circle. Clone the conversation content of all users in the social circle. And then use the imitation domain name to do NIP-05 authentication. Then you can form a fake social network and use it for fraud, right?