Why is this one so much smaller than the first?
-
-
David, the first bounty simulates situation where user has device stolen. The second bounty simulates situation where user has device taken from him (without his knowledge), modified, then returned & continues to work normally while giving the attacker the users phrase or keys
-
Yes, I am aware of that. My question still stands.
- 2 more replies
New conversation -
-
-
It doesn’t look like they dropped the “Unhackable” advertising when it says this on all of them. Lol I’m about to crack this open and see how good this
#Crypto wallet really is. Review video to come soon.


#Bitcoin
#Litecoin#BitcoinCash#ETHEREUMpic.twitter.com/z8MGvxEz18
-
Hi David, we really forward to your video. If you have some questions we would love to put you in touch with CEO or CTO. Thank you!
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.