Hacker News new | past | comments | ask | show | jobs | submit login

You can do this on a technical level but on a practical one it creates pathways for abuse which defeat much of the purpose of using crypto in the first place.

And attackers like the one in the twitter attack would just choose to use cryptocurrencies where this isn't possible.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: