Daniel Lombraña pfp
Daniel Lombraña

@teleyinex.eth

This raises several questions: how do they do KYC? How is the restore process done after verification? How can you enable the opt-in? With the hardware buttons? Probably phishing is going to be a vector attack.
0 reply
0 recast
0 reaction