If your note is unencrypted, it is only a matter of time before it is data mined.
All unencrypted notes are fair game for anyone and everyone to mine and abuse. You should assume an adversarial model rather than one built on good will.
If your note is unencrypted, it is only a matter of time before it is data mined.
All unencrypted notes are fair game for anyone and everyone to mine and abuse. You should assume an adversarial model rather than one built on good will.
No replies yet.