Originally Posted by cpl_dan
same issue here i can consider myself somewhat computer savvy but by reading some info about it looks very complicated and beginners forget about it. One thing that is a major concern is the susceptibility to be hacked in which it did happen several times. There is no code that cannot be hacked so that's a major problem.
If you follow basic safe computing practices it's a non - issue. Most of the people that get "hacked" installed a Trojan that was targeted at miners.
Sent from my SGH-T999 using Tapatalk 2
Oppressors can tyrannize only when they achieve a standing army, an enslaved press, and a disarmed populace. -- James Madison
The Constitution shall never be construed to authorize Congress to prevent the people of the United States, who are peaceable citizens, from keeping their own arms. -- Samuel Adams, Debates and Proceedings in the Convention of the Commonwealth of Massachusetts, 86-87 (Pearce and Hale, eds., Boston, 1850)