This is terrifying.
Generally speaking, I don’t trust any precompiled programs.
I believe it’s safer to compile from source — after all, countless eyes are watching the code. I never imagined that malicious software could have such sophisticated ways of hiding itself.
For ordinary users, this is even more of a nightmare. They usually choose to trust developers, often overlooking the fact that a developer’s device or code could also be compromised.
It seems there really is a need to use a dedicated device — and only the most basic applications — when handling cryptocurrency operations.