Aug 29, 2017 · 1 min read
What is there to identify? Someone sampled patterns and practices from existing cryptographic methods and previous versions of math-based transactions? I don’t know if I should be offended or look down on someone trying to appropriate everything to a Satoshi when everything was based on existing science.
