Daniel Lombraña
@teleyinex.eth
This raises several questions: how do they do KYC? How is the restore process done after verification? How can you enable the opt-in? With the hardware buttons? Probably phishing is going to be a vector attack.
0 reply
0 recast
0 reaction