There are mitigations built into this system using Nostr. Users submit signatures of each hash with their Nostr key and wallets can be configured to verify them. We’ve been very forthcoming with the tradeoffs of all our services, and to say that we haven’t is disingenuous.