Conversation

This Tweet was deleted by the Tweet author. Learn more
Replying to and
Also, even if protocols COULD do the transitivity check on-chain, that makes them extremely vulnerable to exploits because hackers could sprinkle key protocols or addresses with illicit funds to make them unusable for key periods in time, potentially causing major issues
1
4
Replying to
a) x has 15 tokens, y has 20 tokens, x is blocklisted b) x sends 5 to y c) y can still send 20 out--it had 20 legit ones--just can't send the last 5 without being tainted d) y can also burn 5 to 'cure' itself
4
2
Show replies