It's hard to penetrate the users contact list, or the contact list of contacts. But there might be a cat and mouse game with implementation detail so encoding it in a nip would probably not be worth it so clients use different approaches.

Reply to this note

Please Login to reply.

Discussion

No replies yet.