[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]  AminCad Ξ🐬🔊 - evm/acc [@AminCad](/creator/twitter/AminCad) on x 2496 followers Created: 2025-07-17 11:04:28 UTC Legitimate uses of privacy speak directly to intent. If there are numerous legitimate uses of privacy, then the inference that the intent for creating the privacy protocol was to enable crime becomes much more tenuous. If the government is going to say that legitimate uses of privacy shouldn't be referenced, then they should stop claiming that Storm's creation of the privacy protocol shows an intent to facilitate crime, as that implies no other plausible legitimate explanations. XXXXX engagements  **Related Topics** [protocol](/topic/protocol) [inference](/topic/inference) [coins privacy](/topic/coins-privacy) [Post Link](https://x.com/AminCad/status/1945801773790449935)
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
AminCad Ξ🐬🔊 - evm/acc @AminCad on x 2496 followers
Created: 2025-07-17 11:04:28 UTC
Legitimate uses of privacy speak directly to intent. If there are numerous legitimate uses of privacy, then the inference that the intent for creating the privacy protocol was to enable crime becomes much more tenuous.
If the government is going to say that legitimate uses of privacy shouldn't be referenced, then they should stop claiming that Storm's creation of the privacy protocol shows an intent to facilitate crime, as that implies no other plausible legitimate explanations.
XXXXX engagements
Related Topics protocol inference coins privacy
/post/tweet::1945801773790449935