Vulnerabilities get found in modern cell phones and computers and their operating systems all the time. They're a leaky "end," so you have "end plus leakpoints to end plus leakpoints encryption," not "end to end encryption"

Reply to this note

Please Login to reply.

Discussion

No replies yet.