The use of administrative subpoenas, which are not subject to judicial oversight, are used to demand a wealth of information from tech companies, including the owners of anonymous online accounts documenting ICE operations.
Crypto keeps talking about mainstream adoption, but the entire industry is still built on a brittle function and all the vulnerabilities that come with it.