You can do this on a technical level but on a practical one it creates pathways for abuse which defeat much of the purpose of using crypto in the first place.
And attackers like the one in the twitter attack would just choose to use cryptocurrencies where this isn't possible.
And attackers like the one in the twitter attack would just choose to use cryptocurrencies where this isn't possible.