As you say, Jack.
And still, I've seen network shatter operations in the past, and your behavior perfectly emulates them, with the sole exception that (to your credit), you do not run a flood of sock puppets.
Who picks your targets?RT:
https://poa.st/objects/43731be2-2e09-4991-8d8d-c80b4b6d6a5d
nostr:note1jnqmkn00vexg3wehxw3vtu2dj274hm73jrknmk2vzz5euyctvrlqrwj2jd
