Why Nostr? What is Njump?
2024-11-16 18:57:05
in reply to

bitbuds on Nostr: Nope. Many breaches happen without user error. There’s a whole lot you aren’t ...

Nope. Many breaches happen without user error.

There’s a whole lot you aren’t considering. Remote data extraction exists. Code injection without user interaction exists. Zero click exploits exist. Supply chain attacks exist. Not magic, computer science.

If you sign a transaction on an internet connected device, you expose the keys every time.

If you store your keys on metal plates, you cant sign transactions.

Stop trying to push away the tools, we built them for a reason.

Author Public Key
npub1ade7g0nka9jdz008z3k7yn8lrgev4l02z0dw2mzd6q5qfkppxq8sxfqpla