i believe this underlying realization is what will prevent gvts from willy nilly seizing coins out of pure maliciousness:
Our reasoning above applies to the cryptoasset viewed as a conglomeration of public data, private key and system rules. It does not apply to the private key viewed in isolation. That is no more than an item of pure information and, like a password or a telephone number, it cannot in itself be treated as property, although the legal rules concerning confidentiality might provide remedies to prevent wrongful disclosure or misuse.
for if they attempt such blatant abuse upon said system, if they even can, it would cause the price to tank with legal ramifications.
Our reasoning above applies to the cryptoasset viewed as a conglomeration of public data, private key and system rules. It does not apply to the private key viewed in isolation. That is no more than an item of pure information and, like a password or a telephone number, it cannot in itself be treated as property, although the legal rules concerning confidentiality might provide remedies to prevent wrongful disclosure or misuse.
for if they attempt such blatant abuse upon said system, if they even can, it would cause the price to tank with legal ramifications.
Last edited: