Trusted third parties are security holes.

nostr:nevent1qqs0jnt0dajtejddvaythmxnvkq2dhyzfglt5lu4j85r5367kstxxqgpp4mhxue69uhkummn9ekx7mqzyzcls5fue694yzhh47e4n0mdmpj2cla82x6yl33kc45g9k360gnt5qcyqqqqqqgjehgx5

Reply to this note

Please Login to reply.

Discussion

When the product is free the value is you.

Know your threat level and at least always use a VPN you can trust. In this case a simple VPN with a good provider would complicate it so much to get the real identities (provided they did not use real emails) that it would have been enough. The higher your threat level, the more sophisticated tools you will need (Tor, Tails, etc...)