pull down to refresh
It is not but this scenario doesn't concern me that much. Not in the threat model I'm interested in... I'm more concerned about metadata dispersion and post transaction backtracing that real time tracking of transactions.
reply
pull down to refresh
It is not but this scenario doesn't concern me that much. Not in the threat model I'm interested in... I'm more concerned about metadata dispersion and post transaction backtracing that real time tracking of transactions.
Is lightning really private if the government can spy on you by installing malware on your devices? what are you thoughts?