Yeah the note you attached describes it exactly: "even the image host won't be able to see it."

So this covers your threat model.

Reply to this note

Please Login to reply.

Discussion

No replies yet.