You know you've lost the plot when you try to rationalize Proof of Stake as more secure than Proof of Work because "an attacker would need to acquire a bunch of coins in order to attack the network."
Trent Dudenhoeffer
_tdudenhoeffer@fountain.fm
npub1wurn...h7qn
Happy to be here with you all