they don't need to be malicious to collect too much useful metadata, just because these are the limitations of their protocol

Reply to this note

Please Login to reply.

Discussion

No replies yet.