bitbuds on Nostr: Nope. Many breaches happen without user error. There’s a whole lot you aren’t ...
Nope. Many breaches happen without user error.
There’s a whole lot you aren’t considering. Remote data extraction exists. Code injection without user interaction exists. Zero click exploits exist. Supply chain attacks exist. Not magic, computer science.
If you sign a transaction on an internet connected device, you expose the keys every time.
If you store your keys on metal plates, you cant sign transactions.
Stop trying to push away the tools, we built them for a reason.
There’s a whole lot you aren’t considering. Remote data extraction exists. Code injection without user interaction exists. Zero click exploits exist. Supply chain attacks exist. Not magic, computer science.
If you sign a transaction on an internet connected device, you expose the keys every time.
If you store your keys on metal plates, you cant sign transactions.
Stop trying to push away the tools, we built them for a reason.