My issue is that if a bad actor wants to use CSAM as an attack, a change that doesn’t make it impossible is pointless.
My issue is that if a bad actor wants to use CSAM as an attack, a change that doesn’t make it impossible is pointless.
No replies yet.