Daniel Prince
· 3d
Zooms in on QR code.
Takes screen shot.
Opens lightning wallet
Hits SNED.
Imports QR code.
Inputs 10k sats.
Hits SNED again.
Sats sent instantly to a musician playing in a bar miles away.
Tell me a...
Uh... Endpoint compromise, network surveillance, route probing, timing/amount correlation, LSPs become pressure points, KYC on wallets and onoff ramps, targeting users and service providers, ISP blocking, throttling, and node/IP blocking to name a feeeeew..
❤️1