The most strange thing is that we're mining on our phone, each phone has separate ID, each user has separate Wallet ID. Then how a person with just a passphrase is able to steal PI
Quoted content has been removed
Disclaimer: Includes third-party opinions. No financial advice. May include sponsored content.See T&Cs.