your hypothetical are comparing apples to oranges. you keep referencing malicious transactions that would break consensus rules we have in place today. what im talking about are transactions which stay within consensus rules but are for a use case that you don’t like (fwiw, that i don’t like it either). go back to your original post and replace “bullshit jpegs” with “terrorist non-OFAC compliant” and see if your argument changes. it doesn’t.

Replies (1)