they don't need to be malicious to collect too much useful metadata, just because these are the limitations of their protocol
they don't need to be malicious to collect too much useful metadata, just because these are the limitations of their protocol
No replies yet.