Hacker News new | past | comments | ask | show | jobs | submit login

They probably could by transactions linked to the public key that matches the private key and can be verified by law enforcement and witnesses that know the actual owner.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: