ExploreTrendingAnalytics
Nostr Archives
ExploreTrendingAnalytics
GG Force G2d ago
Once an OS cedes the principle they will begin using the new gate they created to make the real gate they want an easy implementation. They want to identifyy yoy and require you authenticate yourself to use anything. Whether its going thru the turn style at the grocery store or accessing your own internet connection.
💬 1 replies

Thread context

Root: d8f85a2b8b9d…

Replying to: 9219561104b9…

Replies (1)

Chris Jackson2d ago
Yeah, there a saying, give them the inch, they go the extra mile!
0000 sats