Conversation

This Tweet was deleted by the Tweet author. Learn more
Replying to and
Also, even if protocols COULD do the transitivity check on-chain, that makes them extremely vulnerable to exploits because hackers could sprinkle key protocols or addresses with illicit funds to make them unusable for key periods in time, potentially causing major issues
1
4
Replying to
note the section where I talk about how an address *shouldn't* be tainted just from receiving funds, because of exactly that worry
1