My strategy is:

1. Collect no personal information

2. Encrypt everything

3. Store data on relays separate from the app

4. Make sure that only the user has the private key.

5. Any agent-type interfaces use a NWC-type interface via relays so that it is impossible to know where the listening agent resides.

Reply to this note

Please Login to reply.

Discussion

No replies yet.